Author:
Naccache David,Shamir Adi,Stern Julien P.
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. J.-M. Acken, How watermarking adds value to digital content, Communications of the ACM, vol. 41-7, pp. 75–77, 1998.
2. P. Bas, J.-M. Chassery and F. Davoine, Self-similarity based image watermarking, Proceedings of eusipco’98, Ninth European signal processing conference, European association for signal processing, pp. 2277–2280.
3. The huge costs of software piracy, Computer Fraud and Security Bulletin, 09/1997, Elsevier Science, page 3.
4. D. Boneh and J. Shaw, Collusion-secure fingerprinting for digital data, Advances in cryptology crypto’95, Springer-Verlag, Lectures notes in computer science 963, pp. 452–465, 1995.
5. B. Chor, A. Fiat and M. Naor, Tracing traitors, Advances in cryptology crypto’94, Springer-Verlag, Lectures notes in computer science 839, pp. 257–270, 1994.
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献