Sciweavers

113 search results - page 7 / 23
» Key Independent Watermark Detection
Sort
View
ISW
1999
Springer
13 years 11 months ago
Region-Based Watermarking for Images
There is a spate of research activities investigating digital image watermarking schemes in an effort to control the problem of illegal proliferation of creative digital data acros...
Gareth Brisbane, Reihaneh Safavi-Naini, Philip Ogu...
PG
2003
IEEE
14 years 22 days ago
Illustration Watermarks for Vector Graphics
Digital watermarking is a technique for embedding information into data, such as images, 3D models, or audio files, such that some properties (i. e., security, imperceptibility, ...
Henry Sonnet, Tobias Isenberg, Jana Dittmann, Thom...
NDSS
1999
IEEE
13 years 11 months ago
Addressing the Problem of Undetected Signature Key Compromise
Suppose that messages have been signed using a user's signature private key during the period of time after a key compromise but before the compromise is detected. This is a ...
Mike Just, Paul C. van Oorschot
DAC
1999
ACM
14 years 8 months ago
Robust FPGA Intellectual Property Protection Through Multiple Small Watermarks
A number of researchers have proposed using digital marks to provide ownership identification for intellectual property. Many of these techniques share three specific weaknesses: ...
John Lach, William H. Mangione-Smith, Miodrag Potk...
CMS
2003
101views Communications» more  CMS 2003»
13 years 8 months ago
Watermark Security via Secret Wavelet Packet Subband Structures
Abstract. Wavelet packet decompositions generalize the classical pyramidal wavelet structure. We use the vast amount of possible wavelet packet decomposition structures to create a...
Werner Dietl, Andreas Uhl