Author:
Venkatesan Ramarathnam,Vazirani Vijay,Sinha Saurabh
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Ross J. Anderson and Fabien A. P. Petitcolas. On the limits of Steganography. IEEE J-SAC, 16(4), May 1998.
2. U. Assmann. OPTIMIX optimizer generator. http://i44www.info.uni-karlsruhe.de/assmann/optimix.html
3. Council for IBM Corporation Software birthmarks. Talk to BCS Technology of Software Protection Special Interest Interest Group. Reported in [AP].
4. Bella Bollobas. 1985. Random Graphs. Academic Press.
5. C. Collberg and C. Thomborson. Software Watermarking: Models and Dynamic Embeddings. Principles of Programming Languages 1999, POPL’99.
Cited by
51 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Structured Watermarks for Structured Software;SN Computer Science;2024-05-22
2. A Robustness-Assured White-Box Watermark in Neural Networks;IEEE Transactions on Dependable and Secure Computing;2023-11
3. Pepal: Penalizing multimedia breaches and partial leakages;International Journal of Information Security;2023-09-14
4. Collusion-Deterrent Threshold Information Escrow;2023 IEEE 36th Computer Security Foundations Symposium (CSF);2023-07
5. Graph Database Watermarking Using Pseudo-Nodes;Proceedings of the Second ACM Data Economy Workshop;2023-06-18