|
[1] A. Adelsbach, U. Huber, and A.-R. Sadeghi. Fingercasting—joint fingerprinting and decryption of broadcast messages. In Information Security and Privacy, pages 136–147. Springer, 2006. [2] R. Anderson and C. Manifavas. Chameleon —a new kind of stream cipher. In E. Biham, editor, Fast Software Encryption, volume 1267 of Lecture Notes in Computer Science, pages 107–113. Springer Berlin Heidelberg, 1997. [3] M. Barni, F. Bartolini, V. Cappellini, and A. Piva. A dct-domain system for robust image watermarking. Signal processing, 66(3):357–372, 1998. [4] T. Bianchi and A. Piva. Secure watermarking for multimedia content protection: A review of its benefits and open issues. Signal Processing Magazine, IEEE, 30(2):87–96, March 2013. [5] M. Celik, A. Lemma, S. Katzenbeisser, and M. van der Veen. Secure embedding of spread spectrum watermarks using look-up-tables. In Acoustics, Speech and Signal Processing, 2007. ICASSP 2007. IEEE International Conference on, volume 2, pages II–153–II–156, April 2007. [6] M. U. Celik, A. N. Lemma, S. Katzenbeisser, and M. van der Veen. Lookup-tablebased secure client-side embedding for spread-spectrum watermarks. IEEE Transactions on Information Forensics and Security, 3(3):475–487, 2008. [7] T.-H. Chen, S.-H. Liu, H.-X. Yao, and W. Gao. Robust video watermarking based on dc coefficients of selected blocks. In Machine Learning and Cybernetics, 2005. Proceedings of 2005 International Conference on, volume 9, pages 5273–5278. IEEE, 2005. [8] T. Farah, H. Hermassi, R. Rhoouma, and S. Belghith. Watermarking and encryption scheme to secure multimedia information. In Computer and Information Technology (WCCIT), 2013 World Congress on, pages 1–5. IEEE, 2013. [9] D. Goudia, M. Chaumont, W. Puech, and N. H. Said. A joint jpeg2000 compression and watermarking system using a tcq-based quantization scheme. In IS&;T/SPIE Electronic Imaging, pages 78820C–78820C. International Society for Optics and Photonics, 2011. [10] C.-T. Hsu and J.-L. Wu. Hidden digital watermarks in images. Image Processing, IEEE Transactions on, 8(1):58–68, Jan 1999. [11] C.-H. Huang and J.-L. Wu. Attacking visible watermarking schemes. Multimedia, IEEE Transactions on, 6(1):16–30, Feb 2004. [12] S. Katzenbeisser, A. Lemma, M. Celik, M. van der Veen, and M. Maas. A buyer seller watermarking protocol based on secure embedding. Information Forensics and Security, IEEE Transactions on, 3(4):783–786, Dec 2008. [13] M. Khan, V. Jeoti, A. Malik, and M. Khan. A joint watermarking and encryption scheme for dct based codecs. In Communications (APCC), 2011 17th Asia-Pacific Conference on, pages 816–820, Oct 2011. [14] G. C. Langelaar, R. L. Lagendijk, and J. Biemond. Real-time labeling of mpeg-2 compressed video. Journal of Visual Communication and Image Representation, 9(4):256 – 270, 1998. [15] C.-L. Lei, P.-L. Yu, P.-L. Tsai, and M.-H. Chan. An efficient and anonymous buyer-seller watermarking protocol. Image Processing, IEEE Transactions on, 13(12):1618–1626, Dec 2004. [16] A. Lemma, S. Katzenbeisser, M. Celik, and M. van der Veen. Secure watermark embedding through partial encryption. In Y. Shi and B. Jeon, editors, Digital Watermarking, volume 4283 of Lecture Notes in Computer Science, pages 433–445. Springer Berlin Heidelberg, 2006. [17] L. Luo, Z. Chen, M. Chen, X. Zeng, and Z. Xiong. Reversible image watermarking using interpolation technique. Information Forensics and Security, IEEE Transactions on, 5(1):187–193, March 2010. [18] H. S. Malvar and D. A. Florencio. Improved spread spectrum: a new modulation technique for robust watermarking. Signal Processing, IEEE Transactions on, 51(4):898–905, 2003. [19] N. Memon and P. Wong. A buyer-seller watermarking protocol. Image Processing, IEEE Transactions on, 10(4):643–649, Apr 2001. [20] A. Piva, T. Bianchi, and A. De Rosa. Secure client-side st-dm watermark embedding. Information Forensics and Security, IEEE Transactions on, 5(1):13–26, March 2010. [21] C.-M. Pun, J.-J. Jiang, and C. L. P. Chen. Adaptive client-side lut-based digital watermarking. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on, pages 795–799, Nov 2011. [22] J. W. Seok and J.-W. Hong. Audio watermarking for copyright protection of digital audio data. Electronics Letters, 37(1):60–61, Jan 2001. [23] F. Siebenhaar, C. Neubauer, and J. Herre. Combined compression/watermarking for audio signals. PREPRINTS-AUDIO ENGINEERING SOCIETY, 2001. [24] J. Zhang, W. Kou, and K. Fan. Secure buyer–seller watermarking protocol. IEE Proceedings-Information Security, 153(1):15–18, 2006. [25] X. Zhang. Reversible data hiding in encrypted image. Signal Processing Letters, IEEE, 18(4):255–258, April 2011. [26] X. Zhang. Reversible data hiding with optimal value transfer. Multimedia, IEEE Transactions on, 15(2):316–325, Feb 2013. [27] B. Zhao, L. Dang, W. Kou, J. Zhang, Z. Li, and K. Fan. A watermarking scheme in the encrypted domain for watermarking protocol. In D. Pei, M. Yung, D. Lin, and C. Wu, editors, Information Security and Cryptology, volume 4990 of Lecture Notes in Computer Science, pages 442–456. Springer Berlin Heidelberg, 2008.
|