Author:
Phan Raphael C.-W.,Bok-Min Goi ,Geong-Sen Poh ,Kim Jongsung
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference25 articles.
1. Choi, J. G., Sakurai, K., & Park, J. H. (2003). Does it need trusted third party? Design of buyer–seller watermarking protocol without trusted third party. In J. Zhou, M. Yung, & Y. Han (Eds.), Applied cryptography and network security—ACNS 2003, Lecture Notes in Computer Science (Vol. 2846, pp. 265–279). Berlin: Springer.
2. Choi, J. G., Park, J. H., & Kwon, K. R. (2004). Analysis of COT-based fingerprinting schemes: New approach to design practical and secure fingerprinting scheme. In J. J. Fridrich (Ed.), 6th International workshop on information hiding—IH 2004, Lecture Notes in Computer Science (Vol. 3200, pp. 253–265). Berlin: Springer.
3. Cox I. J., Kilian J., Leighton T., Shamoon T. (1997) Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6(12): 1673–1687
4. Deng, M., & Preneel, B. (2008a). Attacks on two buyer–seller watermarking protocols and an improvement for revocable anonymity. In International symposium on electronic commerce and security, ICECS 2008 (pp. 923–929). IEEE computer society.
5. Deng, M., & Preneel, B. (2008b). On secure and anonymous buyer–seller watermarking protocol. In 3rd International conference on internet and web applications and services, ICIW 2008 (pp. 524–529). IEEE computer society.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献