Provable secure digital watermarking scheme

被引:0
|
作者
Yuan, Zheng [1 ,2 ,3 ]
机构
[1] Department of Information Security, Beijing Electronic Science and Technology Institute, Beijing 100070, China
[2] Center for Advanced Study, Tsinghua University, Beijing 100084, China
[3] Key Laboratory of Mathematics Mechanization, Chinese Academy of Sciences, Beijing 100080, China
来源
关键词
Digital watermarking;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:91 / 96
相关论文
共 50 条
  • [31] A watermarking scheme for digital cinema
    Haitsma, J
    Kalker, T
    2001 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, 2001, : 487 - 489
  • [32] An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model
    Chin, Ji-Jian
    Heng, Swee-Huay
    Phan, Raphael C. -W.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (07): : 2532 - 2553
  • [33] Provable secure proxy signature scheme without bilinear pairings
    Tiwari, Namita
    Padhye, Sahadeo
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2013, 26 (05) : 644 - 650
  • [34] Provable Secure Group Key Establishment Scheme for Fog Computing
    Chen, Wen-Chin
    Huang, Yin-Tzu
    Wang, Sheng-De
    IEEE ACCESS, 2021, 9 : 158682 - 158694
  • [35] An Efficient Provable Secure Public Auditing Scheme for Cloud Storage
    Xu, Chunxiang
    Zhang, Yuan
    Yu, Yong
    Zhang, Xiaojun
    Wen, Junwei
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4226 - 4241
  • [36] Provable Secure AKA Scheme with Reliable Key Delegation in UNITS
    Huang, Yu-Lun
    Shen, C. Y.
    Shieh, Shiuhpyng
    Wang, Hung-Jui
    Lin, Cheng-Chun
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 243 - 252
  • [37] Cryptanalysis of a forward secure blind signature scheme with provable security
    Wang, SH
    Bao, F
    Deng, RH
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 53 - 60
  • [38] A provable secure pairing-free certificateless identification scheme
    Chin, Ji-Jian
    Tan, Syh-Yuan
    Heng, Swee-Huay
    Phan, Raphael C-W
    Behnia, Rouzbeh
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2015, 92 (08) : 1520 - 1535
  • [39] A Provable Secure Scheme Based on Certificateless Public Key Cryptography
    Wang, Yanhong
    Ye, Junyao
    Ye, Junyao
    3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION ENGINEERING (CSIE 2015), 2015, : 14 - 18
  • [40] COVER: A Secure Blind Image Watermarking Scheme
    Luo, Yuling
    Wang, Fangxiao
    Liu, Junxiu
    Li, Liangjia
    Yang, Su
    Zhang, Shunsheng
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2022, 41 (12) : 6931 - 6959