Sciweavers

20 search results - page 2 / 4
» Pitfalls in Public Key Watermarking
Sort
View
DATE
2005
IEEE
149views Hardware» more  DATE 2005»
15 years 3 months ago
A Public-Key Watermarking Technique for IP Designs
— Sharing IP blocks in today’s competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illeg...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
IH
1999
Springer
15 years 1 months ago
An Asymmetric Public Detection Watermarking Technique
The new watermarking technique1 presented in this paper is an example of an asymmetric public detection scheme. The detection process does not need the original picture nor the sec...
Teddy Furon, Pierre Duhamel
MM
2000
ACM
121views Multimedia» more  MM 2000»
15 years 1 months ago
Multimedia content protection by cryptography and watermarking in tamper-resistant hardware
With the rapid growth of broadband network, distribution of multimedia via Internet is a must way to go. Content protection has become one of the most significant and challenging ...
Feng Bao
PAM
2010
Springer
15 years 4 months ago
Quantifying the Pitfalls of Traceroute in AS Connectivity Inference
Although traceroute has the potential to discover AS links that are invisible to existing BGP monitors, it is well known that the common approach for mapping router IP address to A...
Yu Zhang, Ricardo V. Oliveira, Hongli Zhang, Lixia...
81
Voted
ICIP
2005
IEEE
15 years 11 months ago
An asymmetric watermarking method for copyright protection utilizing dual bases
We present an asymmetric watermarking method for copyright protection that uses different matrix operations to embed and extract a watermark. It allows for the public release of a...
Jengnan Tzeng, Wen-Liang Hwang, I-Liang Chern