Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications S Craver, N Memon, BL Yeo, MM Yeung IEEE Journal on Selected areas in Communications 16 (4), 573-586, 1998 | 858 | 1998 |
Can invisible watermarks resolve rightful ownerships? SA Craver, ND Memon, BL Yeo, MM Yeung Storage and Retrieval for Image and Video Databases V 3022, 310-321, 1997 | 393 | 1997 |
Moving steganography and steganalysis from the laboratory into the real world AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ... Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013 | 295 | 2013 |
On public-key steganography in the presence of an active warden S Craver Information Hiding: Second International Workshop, IH’98 Portland, Oregon …, 1998 | 200 | 1998 |
Technical trials and legal tribulations S Craver, BL Yeo, M Yeung Communications of the ACM 41 (7), 45-54, 1998 | 132 | 1998 |
Reading Between the Lines: Lessons from the SDMI Challenge. S Craver, M Wu, B Liu, A Stubblefield, B Swartzlander, DS Wallach, ... USENIX security symposium, 2001 | 130 | 2001 |
Zero knowledge watermark detection S Craver Information Hiding: Third International Workshop, IH’99, Dresden, Germany …, 2000 | 126 | 2000 |
On the invertibility of invisible watermarking techniques S Craver, N Memon, BL Yeo, MM Yeung Proceedings of International Conference on Image Processing 1, 540-543, 1997 | 106 | 1997 |
Copyright protection protocols based on asymmetric watermarking: The ticket concept S Craver, S Katzenbeisser Communications and Multimedia Security Issues of the New Century: IFIP TC6 …, 2001 | 50 | 2001 |
What can we reasonably expect from watermarks? SA Craver, M Wu, B Liu Proceedings of the 2001 IEEE Workshop on the Applications of Signal …, 2001 | 48 | 2001 |
Analysis of attacks on SDMI audio watermarks M Wu, S Craver, EW Felten, B Liu 2001 IEEE International Conference on Acoustics, Speech, and Signal …, 2001 | 47 | 2001 |
Security analysis of public key watermarking schemes SA Craver, S Katzenbeisser Mathematics of Data/Image Coding, Compression, and Encryption IV, with …, 2001 | 45 | 2001 |
Multilinearization data structure for image browsing SA Craver, BL Yeo, MM Yeung Storage and Retrieval for Image and Video Databases VII 3656, 155-166, 1998 | 36 | 1998 |
Toward the identification of DSLR lenses by chromatic aberration J Yu, S Craver, E Li Media Watermarking, Security, and Forensics III 7880, 373-381, 2011 | 18 | 2011 |
A supraliminal channel in a videoconferencing application S Craver, E Li, J Yu, I Atakli Information Hiding: 10th International Workshop, IH 2008, Santa Barbara, CA …, 2008 | 18 | 2008 |
A supraliminal channel in a wireless phone application E Li, S Craver Proceedings of the 11th ACM workshop on Multimedia and security, 151-154, 2009 | 16 | 2009 |
Robustness of copyright marking systems S Craver, A Perrig, FAP Petitcolas Information hiding techniques for steganography and digital watermarking, 2000 | 15 | 2000 |
An implementation of, and attacks on, zero-knowledge watermarking S Craver, B Liu, W Wolf Information Hiding: 6th International Workshop, IH 2004, Toronto, Canada …, 2005 | 13 | 2005 |
Lessons learned from SDMI S Craver, JP Stern 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No. 01TH8564 …, 2001 | 11 | 2001 |
Subset selection circumvents the square root law S Craver, J Yu Media Forensics and Security II 7541, 20-25, 2010 | 10 | 2010 |