Digital watermarks enabling e-commerce strategies: conditional and user specific access to services and resources

J Dittmann, M Steinebach, P Wohlmacher… - EURASIP Journal on …, 2002 - Springer
… a product receives annotation watermarks embedded in it. These … conditional access
mechanisms for annotation watermarks. We have presented our approaches for conditional access

[PDF][PDF] Beyond Cryptographic Conditional Access.

DM Goldschlag, DW Kravitz - Smartcard, 1999 - usenix.org
… To play watermarked content, each legitimate … embedded watermark signal which differs
from the one just previous. At the onset of attempted content play, the first embedded watermark

A novel triple recovery information embedding approach for self-embedded digital image watermarking

E Gul, S Ozturk - Multimedia Tools and applications, 2020 - Springer
… a novel self-embedded fragile watermarking method with triple … Recovery bits for each partner
block are embedded into the … for each partner block are embedded into three other blocks …

Conditional and user specific access to services and resources using annotation watermarks

J Dittmann, P Wohlmacher, R Ackermann - … Issues of the New Century: IFIP …, 2001 - Springer
… the possibility to embed codes as annotation watermark into the … conditional access
mechanisms for annotation watermarks. We have presented our approaches for conditional access

Layered access control schemes on watermarked scalable media

FC Chang, HC Huang, HM Hang - The Journal of VLSI Signal Processing …, 2007 - Springer
… of both encryption and watermarking, copyrights of multimedia … When the embedded
watermark is extracted with high … method that meets the conditional access and layered coding …

Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications

S Craver, N Memon, BL Yeo… - IEEE Journal on Selected …, 1998 - ieeexplore.ieee.org
… However, we have demonstrated in this paper that the ability to embed robust watermarks
in digital images does not necessarily imply the ability to establish ownership, unless certain …

Layered access control schemes on watermarked scalable media

FC Chang, HC Huang, HM Hang - 2005 IEEE International …, 2005 - ieeexplore.ieee.org
… robustness of the embedded key information. Overall, the layered protection structure
proposed in this paper is a reliable method that meets the conditional access and layered coding …

Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques

WN Lie, GS Lin, SL Cheng - IEEE Transactions on Information …, 2006 - ieeexplore.ieee.org
… accept raw image data as input and embed watermark signals in the transform domain
without … Similar to [24], we utilize the Wiener filter to estimate the embedded watermark signal. …

Secure watermark embedding through partial encryption

A Lemma, S Katzenbeisser, M Celik… - Digital Watermarking …, 2006 - Springer
… copy of the distributed content is watermarked with a unique … is found, the embedded
watermark (carrying the transaction … watermark embedding; Section 3 reviews existing client-side …

Watermarking of MPEG-4 video objects

M Barni, F Bartolini, N Checcacci - IEEE Transactions on …, 2005 - ieeexplore.ieee.org
… from watermarking technology, since it can enable a number of innovative services, such as
conditional access … The embedded watermark must be resistant to the processing a video …