Sciweavers

94 search results - page 12 / 19
» Attacks on Copyright Marking Systems
Sort
View
ADC
1999
Springer
97views Database» more  ADC 1999»
14 years 26 days ago
Pseudo-Naive Evaluation
We introduce pseudo-naive evaluation, a method for execution of mixed top-down/bottom-up logic programs and deductive databases. The method is intermediate in power between naive ...
Donald A. Smith, Mark Utting
ICMCS
2006
IEEE
146views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Hybrid Traitor Tracing
In this paper we study the traitor tracing problem, a technique to help combat piracy of copyrighted materials. When a pirated copy of the material is observed, a traitor tracing ...
Hongxia Jin, Jeffery Lotspiech
IWDW
2005
Springer
14 years 2 months ago
Performance Study on Multimedia Fingerprinting Employing Traceability Codes
Digital fingerprinting is a tool to protect multimedia content from illegal redistribution by uniquely marking copies of the content distributed to each user. Collusion attack is ...
Shan He, Min Wu
ICDAR
1995
IEEE
14 years 4 days ago
Semi-automatic delineation of regions in floor plans
We propose a technique that makes use of a proximity metric for delineating partially or fully bounded regions of a scanned bitmap that depicts a building floor plan. A proximity...
Kathy Ryall, Stuart M. Shieber, Joe Marks, Murray ...
IWDW
2005
Springer
14 years 2 months ago
Robustness Enhancement of Content-Based Watermarks Using Entropy Masking Effect
Image-Adaptive watermarking systems exploit visual models to adapt the watermark to local properties of the host image. This leads to a watermark power enhancement, hence an improv...
Amir Houman Sadr, Shahrokh Ghaemmaghami