Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
TIFS
2010
109views more  TIFS 2010»
9 years 8 months ago
A Provably Secure Anonymous Buyer-Seller Watermarking Protocol
Buyer
Alfredo Rial, Mina Deng, Tiziano Bianchi, Alessand...
CCR
2002
113views more  CCR 2002»
10 years 1 months ago
A secure multicast protocol with copyright protection
We present a simple, efficient, and secure multicast protocol with copyright protection in an open and insecure network environment. There is a wide variety of multimedia applicat...
Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wa...
MMS
2008
10 years 1 months ago
On error-correcting fingerprinting codes for use with watermarking
Digital fingerprinting has been suggested for copyright protection. Using a watermarking scheme, a fingerprint identifying the buyer is embedded in every copy sold. If an illegal c...
Hans Georg Schaathun
IJNSEC
2006
77views more  IJNSEC 2006»
10 years 1 months ago
Towards a Secure Copyright Protection Infrastructure for e-Education Material: Principles Learned from Experience
Copyright of e-Education material is valuable. The need for protecting it is prominent. In the past two years, we have developed an infrastructure called e-Course eXchange (eCX ) ...
Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Siu-Ming Yiu,...
IEPOL
2006
57views more  IEPOL 2006»
10 years 1 months ago
Multi-level markets and incentives for information goods
The free-rider phenomenon which impedes the marketing of information goods is conventionally countered by copyright protection regulations and technology. Alternative ways to mark...
Andreas U. Schmidt
SIP
2007
10 years 2 months ago
Geometrically robust image watermarking using star patterns
Digital copyright protection has become increasingly important in recent times due to the rapid growth of the Internet and the proliferation of P2P technologies. Copyright protect...
J. R. Zhang, Jon G. Rokne
books