Sciweavers

1228 search results - page 32 / 246
» Copyright
Sort
View
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
14 years 3 months ago
Robust watermarking of music signals by cepstrum modification
— A method of embedding a predetermined watermark in an audio signal is described for audio music copyright protection applications. The proposed technique applies the psychoacou...
Kaliappan Gopalan
MIS
1999
Springer
111views Multimedia» more  MIS 1999»
14 years 1 months ago
On Fingerprinting Images for Recognition
A central task in multimedia systems is image management (storage and retrieval). As information is disseminated across vast networks, such as the Internet, methods of locating au...
Neil F. Johnson, Zoran Duric, Sushil Jajodia
PKC
1999
Springer
125views Cryptology» more  PKC 1999»
14 years 1 months ago
Anonymous Fingerprinting Based on Committed Oblivious Transfer
Abstract. Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared a...
Josep Domingo-Ferrer
CARDIS
1998
Springer
121views Hardware» more  CARDIS 1998»
14 years 1 months ago
Efficient Smart-Card Based Anonymous Fingerprinting
Abstract. Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared as...
Josep Domingo-Ferrer, Jordi Herrera-Joancomart&iac...
IICS
2010
Springer
14 years 1 months ago
Using Digital Images to spread Executable Code on Internet
. Steganography is defined as covered writing and it has been used to achieve confidentiality. Most of research in this domain has focused in just sending plain data. In this paper...
Roberto Gómez, Gabriel Ramírez