- 1 Cox, I., Kilian, J., Leighton, T., and Shamoon, T. Secure spread spectrum watermarking for multimedia. Tech. Rep. 95-10, NEC Research Institute, Princeton, N.J., 1995.Google Scholar
- 2 Friedman, G. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Trans. Comum. Electron. 39, 4 (Nov. 1993), 905-910.Google Scholar
- 3 Knox, K., and Wang, S. Digital watermarks using stochastic screens. In Proceedings of SPIE/IS&T Symposium on Electronic Imaging (San Jose, Calif., Jan.), SPIE, Bellingham, Wa., 1997.Google Scholar
- 4 Magerlein, K., Braudaway, G., and Mintzer, F. Protecting publicly available images with a visible image watermark. In Proceedings of Optical Security and Counterfeit Deterrence Techniques (San Jose, Calif., Feb.). SPIE, Bellingham, Wa., 1996, pp. 126-132.Google Scholar
- 5 Nikolaidis, N., and Pitas, I. Copyright protection of images using robust digital signatures. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (Atlanta, Ga., May). IEEE Press, 1996, pp. 2,168-2,171. Google ScholarDigital Library
- 6 Sarwate, D., and Pursley, M. Cross-correlation properties of pseudorandora and related sequences. Proc. IEEE 68 (May 1980), 593-619.Google ScholarCross Ref
- 7 Shamir, A. Method and apparatus for protecting visual information with printed cryptographic watermarks. U.S. patent 5488664, Jan. 1996.Google Scholar
- 8 Swanson, M., Kobayashi, M., and Tewfik, A. Multimedia data embedding and watermarking technologies. IEEE Proc. 86, 6 (June 1998) 1,064-1,087.Google ScholarCross Ref
- 9 Van Schyndel, R., Tirkel, A., and Osborne, C. A digital watermark. In Proceedings of ICIP (Austin, Tex., Nov.). IEEE Press, 1994, pp. 86-90.Google Scholar
- 10 Wong, P. A watermark for image integrity and ownership verification. In Proceedings of IS&T PIC Conference (Portland, Oreg., May). 1998.Google Scholar
- 11 Yeung, M., and Mintzer, F. An invisible watermarking technique for image verification. In Proceedings of ICIP (Santa Barbara, Calif., Oct.). IEEE Press, 1997.Google ScholarCross Ref
- 12 Zhao, J., and Koch, E. Embedding robust labels into images for copyright protection. In Proceedings of the KnowRight'95 Conference on Intellectual Property Rights and New Technologies (Vienna, Austria, Aug.), 1995, pp. 241-251. Google ScholarDigital Library
Index Terms
Protecting digital media content
Recommendations
Digital rights management & protecting the digital media value chain
MUM '04: Proceedings of the 3rd international conference on Mobile and ubiquitous multimediaDigital media that is readily & illegally distributed over the Internet and related digital networks has posed major problems for the members of the digital media value chain. Ubiquitous mobile communication devices such as media capable handsets and ...
Will Digital Fluency Influence Social Media Use?: An Empirical Study of WeChat Users
Social media has increasingly been used in both personal and professional communications. Past studies note that individuals of digital fluency present distinctive behaviors in technology use. However, limited research has explored how digital fluency ...
Protecting browsers from cross-origin CSS attacks
CCS '10: Proceedings of the 17th ACM conference on Computer and communications securityCross-origin CSS attacks use style sheet import to steal confidential information from a victim website, hijacking a user's existing authenticated session; existing XSS defenses are ineffective. We show how to conduct these attacks with any browser, ...
Comments