1 |
R. G. Van Schyndel, A. z. Tirkel, and I. D. Svalbe, 'Key independent watermark detection,' in Proc, of the IEEE Intl. Conf, on Multimedia Computing and Systems, Vol.1, pp.580-584, Florence, Italy, June, 1999
DOI
|
2 |
H. Choi, K, Lee, and T. Kim, 'Transformed-key asymmetric watermarking system,' in Proc. of SPIE: Security and Watermarkin of Multimedia Contents, Vol.4314, pp.280-289, San Jose, USA, Jan., 2001
DOI
|
3 |
Craver S, 'Zero knowledge watermark detection,' in International Workshop on Information Hiding (IHW'99), Lecture Notes in Computer Science 1768, pp.101-116, 1999
|
4 |
Adelsbach A, Sadeghi AR, 'Zero-Knowledge waterark detection and proof of ownership,' in International Worshop on Information Hiding (IHW'2001) Lecture Notes in Computer Sciece 2137, pp.273-288, 2001
|
5 |
Adelsbach a, Katzenbeisser S, Sadeghi AR, 'Cryptography meets watermarking detecting watermarks with minimal or zero knowledge disclosure,' in Proceedings of the European Signal Processing Conference (EUSIPCO'2002), Toulouse, France, September 3-6, 2002
|
6 |
Craver S, Katzenbeisser S, 'Copyright protection protocols based on asymmetric watermark : The ticket concept,' in Proceedings of the 6th Conference on Communication and Multimedia Security (CMS'01), pp.159-170, 2001
|
7 |
J. Picard and A. Robert, 'Neural Networks functions for public key watermarking,' in Workshop on Information Hiding, pp.142-156, Pittsburgh, PA, USA, Apr., 2001
DOI
ScienceOn
|
8 |
J. Smith and C. Dodge, 'Development in steganography,' in Workshop on Information Hiding, pp.77-87, Dresden, Germany, Oct., 1999
|
9 |
T. Furon and P. Duhamel,' An saymmetric public detection watermarking technique,' in Workshop on Information Hiding, pp.88-100, Dresden, Germany, Oct., 1999
|