Diffie-Hellman is as strong as discrete log for certain primes
CRYPTO '88 Proceedings on Advances in cryptology
The JPEG still picture compression standard
Communications of the ACM - Special issue on digital multimedia systems
Embedding robust labels into images for copyright protection
KnowRight '95 Proceedings of the conference on Intellectual property rights and new technologies
Digital watermarking
Optimal transform domain watermark embedding via linear programming
Signal Processing - Special section on information theoretic aspects of digital watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Hi-index | 0.00 |
Modern techniques make digital articles easy to copy and manipulate. Content protection systems aim at protecting the rights of producers and distributors. These mostly rely on data encryption, digital watermarking, and special-purpose devices. In this paper, we describe two content protection schemes, both of which make use of tamper-resistant devices and device-dependent decryption keys. One of the schemes uses a modified El Gamal system, in the other one we combine watermarking with encryption.