Sciweavers

IH
2001
Springer
13 years 9 months ago
Computational Forensic Techniques for Intellectual Property Protection
Computational forensic engineering (CFE) aims to identify the entity that created a particular intellectual property (IP). Rather than relying on watermarking content or designs, t...
Jennifer L. Wong, Darko Kirovski, Miodrag Potkonja...
IH
2001
Springer
13 years 9 months ago
F5-A Steganographic Algorithm
Many steganographic systems are weak against visual and statistical attacks. Systems without these weaknesses offer only a relatively small capacity for steganographic messages. T...
Andreas Westfeld
IH
2001
Springer
13 years 9 months ago
Blur/Deblur Attack against Document Protection Systems Based on Digital Watermarking
Abstract. A growing concern emerges regarding the possibility of counterfeiting currencies using digital imaging technologies. In order to help developing resistance against this n...
Sviatoslav Voloshynovskiy, Alexander Herrigel, Thi...
IH
2001
Springer
13 years 9 months ago
COiN-Video: A Model for the Dissemination of Copyrighted Video Streams over Open Networks
As digital technology over open networks evolves, commercialization of video streams is coming of age. Traditional models for video stream commercialization suffer from copyright ...
Dimitris Thanos
IH
2001
Springer
13 years 9 months ago
Second Generation Benchmarking and Application Oriented Evaluation
Shelby Pereira, Sviatoslav Voloshynovskiy, Maribel...
IH
2001
Springer
13 years 9 months ago
A Reputation System to Increase MIX-Net Reliability
We describe a design for a reputation system that increases the reliability and thus efficiency of remailer services. Our reputation system uses a MIX-net in which MIXes give recei...
Roger Dingledine, Michael J. Freedman, David Hopwo...
IH
2001
Springer
13 years 9 months ago
Digital Watermarking of Chemical Structure Sets
Joachim J. Eggers, Wolf-Dietrich Ihlenfeldt, Bernd...
IH
2001
Springer
13 years 9 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
IH
2001
Springer
13 years 9 months ago
Intellectual Property Metering
Abstract. We have developed the first hardware and software (intellectual property) metering scheme that enables reliable low overhead proofs for the number of manufactured parts a...
Farinaz Koushanfar, Gang Qu, Miodrag Potkonjak
IH
2001
Springer
13 years 9 months ago
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum fo...
Darko Kirovski, Henrique S. Malvar