A practical and secure buyer-seller watermarking protocol

Defa Hu; Qiaoliang Li
February 2011
Journal of Digital Information Management;Feb2011, Vol. 9 Issue 1, p43
Academic Journal
No abstract available.


Related Articles

  • Defenders of the System. Waller, Mark; Crombie, Graham // Chartered Accountants Journal;Jun2001, Vol. 80 Issue 5, p4 

    Discusses information security management. Continuing emergence of threats with constant changes in technology; Imperative of continual review and updating of information security policies and technology; Available monitoring resources.

  • Improved Zero Text Watermarking Algorithm against Meaning Preserving Attacks. Jalil, Z.; Farooq, M.; Zafar, H.; Sabir, M.; Ashraf, E. // World Academy of Science, Engineering & Technology;Nov2010, Issue 47, p593 

    No abstract available.

  • Countering the Dropbox.com Security Menace. Vizard, Michael // Channel Insider;4/9/2012, p1 

    The article reports on the concerns over the security and productivity issues involving Dropbox.com. Dropbox users believe that information technology (IT) organizations were not prepared for the need to share documents among users. Meanwhile, IT professionals are anxious about the security...

  • FAKES CATCH BREAK. Hopewell, John; Mayorga, Emilio // Daily Variety;8/13/2010, Vol. 308 Issue 29, p5 

    The article reports that two regions in Catalonia, Spain, such as Calafell and El Vendrell, have proposed penalty-free areas for bootleggers who market pirated movies and fake bags.

  • Arab state blasts media pirates. Warg, Peter // Variety;04/14/97, Vol. 366 Issue 11, p25 

    Reports on the United Arab Emirates' campaign against intellectual property piracy as of April 14, 1997. Details of the government's efforts to cut piracy levels in the country.

  • Italian gov't calls for unity in piracy fight. Dezzani, Mark // Billboard;6/15/96, Vol. 108 Issue 24, p55 

    Reports that Italy's new center-left government has pledged to take rapid action toward combating the country's widespread piracy problem. Need to pass stricter laws against pirates and to unify the diverse bodies tackling the piracy issue; Federation Against Audio Visual Piracy president Paolo...

  • Piracy war shifts in SE Asia. Burpee, Geoff; Whyman, Niva // Billboard;04/11/98, Vol. 110 Issue 15, p6 

    Reports on the anti-piracy legislation due to be placed before Hong Kong's provisional government in early April 1998. Fears that the piracy trade will move to another location in Asia; Details of the legislation; How law enforcement officers in Hong Kong will be able to search premises and...

  • The 2010-2015 World Outlook for Security Information Management (SIM) Software. Parker, Philip M. // World Outlook Reports;1/ 1/2010, pN.PAG 

    Several charts are presented which offer information on the 2010 to 2015 world outlook for security information management (SIM) software in Asia, Europe and Middle East.

  • Security Technology Spending Declines as Share of IT Budget.  // Computer Economics Report;Mar2008, Vol. 30 Issue 3, p1 

    The article discusses a study which examines the condition of the security spending of the Information Technology (IT) industry in the U.S. The result on the three-year trend in IT security spending and staffing demonstrates that the spending for security-related hardware, software and services...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics