[1]
T. Furon and P. Duhamel. An asymmetric public detection watermarking technique. 3rd Intl. Workshop on Information Hiding, LNCS 1768: 88–100, (2000).
DOI: 10.1007/10719724_7
Google Scholar
[2]
J.J. Eggers, J.K. Su, and B. Girod. Public key watermarking by eigenvectors of linear transforms. European Signal Processing Conference, September (2000).
Google Scholar
[3]
J.J. Eggers, J.K. Su, and B. Girod. Asymmetric watermarking schemes. Sicherheit in Mediendaten, September (2000).
Google Scholar
[4]
A. Adelsbach and A. Sadeghi. Zero-knowledge watermark detection and proof of ownership. 4th Int. Workshop on Info. Hiding, LNCS 2137: 273–288, (2000).
DOI: 10.1007/3-540-45496-9_20
Google Scholar
[5]
S. Craver and S. Katzenbeisser. Copyright protection protocols based on asymmetric watermarking. In CMS'01, pages 159–170, (2001).
Google Scholar
[6]
Q. Li and E. -C. Chang. ZeroKnowledge Watermark Detection Resistant to Ambiguity Attacks. MM&Sec'06, pp.158-163, September 26–27, 2006, Geneva, Switzerland.
Google Scholar
[7]
Juan Ram´on Troncoso-Pastoriza, Fernando P´erez-Gonz´alez. Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks. MM&Sec'06, pages 97-107, September 26–27, 2006, Geneva, Switzerland.
DOI: 10.1145/1161366.1161383
Google Scholar
[8]
Q. Li and E. -C. Chang. Public watermark detection using multiple proxies and secret sharing. In International Workshop on Digital Watermarking, volume 2939 of LNCS, pages 558–569, Seoul, Korea, October (2003).
DOI: 10.1007/978-3-540-24624-4_45
Google Scholar
[9]
I.J. Cox, M.L. Miller, and J.A. Bloom. Digital Watermarking. Morgan Kaufmann, (2002).
Google Scholar
[10]
Yair Frankel, Philip MacKenzie, and Moti Yung. Adaptively secure distributed public-key systems. Theoretical Computer Science, Vol. 2002, No. 287, p.535–561, (2002).
DOI: 10.1016/s0304-3975(01)00260-2
Google Scholar
[11]
I. Damg˚ard, M. Fitzi, E. Kiltz, J.B. Nielsen, and T. Toft, Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation, Proc. 3rd Theory of Cryptography Conference, LNCS 3876, p.285–304, Springer Verlag, (2006).
DOI: 10.1007/11681878_15
Google Scholar