Technical trials and legal tribulations
Communications of the ACM
Protecting Digital-Image Copyrights: A Framework
IEEE Computer Graphics and Applications
DEXA '01 Proceedings of the 12th International Workshop on Database and Expert Systems Applications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
A virtual image cryptosystem based upon vector quantization
IEEE Transactions on Image Processing
A buyer-seller watermarking protocol
IEEE Transactions on Image Processing
Visual-based embedding systems with targeted secret disclosures and applications
International Journal of Ad Hoc and Ubiquitous Computing
On the security of a visual cryptography scheme for color images
Pattern Recognition
Visual secret sharing by random grids revisited
Pattern Recognition
Preventing Cheating in Computational Visual Cryptography
Fundamenta Informaticae
Friendly Color Visual Secret Sharing by Random Grids
Fundamenta Informaticae
A novel CRT-based watermarking technique for authentication of multimedia contents
Digital Signal Processing
A novel DCT domain CRT-based watermarking scheme for image authentication surviving JPEG compression
Digital Signal Processing
Threshold visual secret sharing by random grids
Journal of Systems and Software
Preventing Cheating in Computational Visual Cryptography
Fundamenta Informaticae
Hi-index | 0.01 |
Over the past few years, there have been more and more robust watermarking schemes proposed for copyright protection of digital documents. The authors combine cryptography with watermarking to simultaneously address the problems of protecting the owner's copyright and the legal customer's ownership. The authors propose a robust watermarking scheme based on visual cryptography and a watermarking protocol based on asymmetric cryptography. It is worthwhile to note that the proposed schemes are resistant to counterfeit, collusion, averaging, and copy attacks, while the large majority of robust watermarking schemes are not. Furthermore, the application of digital signature and timestamp makes public verification possible.