Author:
Darmstaedter V.,Delaigle J.-F.,Quisquater J.J.,Macq B.
Subject
Computer Graphics and Computer-Aided Design,Human-Computer Interaction,General Engineering
Reference16 articles.
1. Kahin, B., The Strategic Environmant for Protecting Multimedia. IMA Intellectual Property Proceedings, Vol. 1, pp. 1–8, January 1994
2. Video-Steganography: How to Embed a Signature in a Picture;Matsui;IMA Intellectual Property Proceedings,1994
3. Brassil, J. T., Maxemchuk, N. F., Low, S. and O'Gornam, L., Electronic Marking and Identification techniques to Discourage Document Copying. Proceeding of IEEE INFOCOM `94, Toronto, pp. 1278–1287, June 1994
4. Bender, W., Gruhl, D. and Moromoto, N., Techniques for Data Hiding. Proceedings of the SPIE, San Jose, 2420(40), February 1994
5. Caronni, G., Assuring Ownership Rights for Digital Images. Proceedings of reliable IT systems, VIS 95 Germany, June 1995
Cited by
29 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献