Cryptography Reference
In-Depth Information
[Pro01a]
Niels Provos. Defending against statistical steganalysis,
August 2001.
[Pro01b]
Niels Provos. Probabilistic methods for improving in-
formation hiding. Technical Report 01-1, University of
Michigan, January 2001.
[PSM06]
Dima Profrock, Mathias Schlauweg, and Erika Muller.
Video watermarking by using geometric warping with-
out visible artifacts. In Camenisch et al. [CCJS07], pages
78-92.
[Pub88]
Publius. Federalist: A Collection of Essays Written in
Favor of the New Constitution . J. and A. McClean, 1788.
[QC82]
J.-J. Quisquater and C. Couvreur. Fast decipherment
algorithm for rsa public-key cryptosystem. Electronic
Letters , 18, 1982.
[Qu01]
Gang Qu. Keyless public watermarking for intellectual
property authentication. In Fourth Information Hiding
Workshop , 2001.
[Rab89a]
Michael Rabin. Efficient dispersal of information for
security, load balancing and fault tolerance. Journal of
the ACM , 38:335-348, 1989.
[Rab89b] Michael O. Rabin. Efficient dispersal of information for
security, load balancing, and fault tolerance.
J. ACM ,
36(2):335-348, 1989.
[RC95]
R. Rinaldo and G. Calvagno. Image coding by block pre-
diction of multiresolution submimages. IEEE Transac-
tions on Image Processing , 4:909-920, 1995.
[RDB96]
J. Ruanaidh, W. Dowling, and F. Boland. Phase water-
marking of digital images. In Proceedings of ICIP'96 ,
volume III, pages 239-242, Lausanne, Switzerland,
September 1996.
[Riv98]
Ron Rivest. Chaffing and winnowing: Confidentiality
without encryption, summer 1998.
[Riv04]
Ronald L. Rivest. Peppercoin micropayments. In Ari
Juels, editor, Financial Cryptography , volume 3110 of
Lecture Notes in Computer Science , pages 2-8. Springer,
2004.
Search WWH ::




Custom Search