Sciweavers

IH
2001
Springer
14 years 1 months ago
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking
Abstract. A growing concern emerges regarding the possibility of counterfeiting currencies using digital imaging technologies. In order to help developing resistance against this n...
Sviatoslav Voloshynovskiy, Alexander Herrigel, Thi...
IH
2001
Springer
14 years 1 months ago
COiN-Video: A Model for the Dissemination of Copyrighted Video Streams over Open Networks
As digital technology over open networks evolves, commercialization of video streams is coming of age. Traditional models for video stream commercialization suffer from copyright ...
Dimitris Thanos
IH
2001
Springer
14 years 1 months ago
Second Generation Benchmarking and Application Oriented Evaluation
Shelby Pereira, Sviatoslav Voloshynovskiy, Maribel...
IH
2001
Springer
14 years 1 months ago
A Reputation System to Increase MIX-Net Reliability
We describe a design for a reputation system that increases the reliability and thus efficiency of remailer services. Our reputation system uses a MIX-net in which MIXes give recei...
Roger Dingledine, Michael J. Freedman, David Hopwo...
IH
2001
Springer
14 years 1 months ago
Digital Watermarking of Chemical Structure Sets
Joachim J. Eggers, Wolf-Dietrich Ihlenfeldt, Bernd...
IH
2001
Springer
14 years 1 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
IH
2001
Springer
14 years 1 months ago
Intellectual Property Metering
Abstract. We have developed the first hardware and software (intellectual property) metering scheme that enables reliable low overhead proofs for the number of manufactured parts a...
Farinaz Koushanfar, Gang Qu, Miodrag Potkonjak
IH
2001
Springer
14 years 1 months ago
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum fo...
Darko Kirovski, Henrique S. Malvar
IH
2001
Springer
14 years 1 months ago
The Strong Eternity Service
Strong Eternity Service is a safe and very reliable storage for data of high importance. We show how to establish persistent pseudonyms in a totally anonymous environment and how t...
Tonda Benes
IH
2001
Springer
14 years 1 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu