共 12 条
[4]
Craver S, 1998, COMMUN ACM, V41, P44, DOI 10.1145/278476.278486
[5]
HOU YC, 2000, IEEE INT C SIGN PROC, V2, P992
[6]
On the design of copyright protection protocols for multimedia distribution using symmetric and public-key watermarking
[J].
12TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS,
2001,
:815-819
[7]
The watermark copy attack
[J].
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II,
2000, 3971
:371-380
[9]
Naor M., 1994, Lecture Notes in Comput. Sci., P1, DOI 10.1007/BFb0053419