Author:
Eslami Ziba,Kazemnasabhaji Mohammad,Mirehi Narges
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference37 articles.
1. Benhocine A, Laouamer L, Nana L, Pascu AC (2013) New images watermarking scheme based on singular value decomposition. Journal of Information Hiding and Multimedia Signal Processing 4(1):9–18
2. Boneh D, Shaw J (1995) Collusion-secure fingerprinting for digital data. In: Advances in cryptology–CRYPTO–95. Lecture notes in computer science, vol 963. Springer, Heidelberg, pp 452–465
3. Chang CC, Tsai HC, Hsieh YP (2010) An efficient and fair buyer–seller fingerprinting scheme for large scale networks, computers & security, vol 29, pp 269–277
4. Choi JHPJG, Sakurai K (2003) Does it need trusted third party? design of buyer–seller watermarking protocol without trusted third party. In: Applied cryptography and network security. LNCS 2846, pp 265–279
5. Cox IJ, Kilian J, Leighton T, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献