Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications S Craver, N Memon, BL Yeo, MM Yeung IEEE Journal on Selected areas in Communications 16 (4), 573-586, 1998 | 865 | 1998 |
Can invisible watermarks resolve rightful ownerships? SA Craver, ND Memon, BL Yeo, MM Yeung Storage and Retrieval for Image and Video Databases V 3022, 310-321, 1997 | 401 | 1997 |
Moving steganography and steganalysis from the laboratory into the real world AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ... Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013 | 335 | 2013 |
On public-key steganography in the presence of an active warden S Craver International Workshop on Information Hiding, 355-368, 1998 | 210 | 1998 |
Zero knowledge watermark detection S Craver Information Hiding: Third International Workshop, IH’99, Dresden, Germany …, 2000 | 134 | 2000 |
Technical trials and legal tribulations S Craver, BL Yeo, M Yeung Communications of the ACM 41 (7), 45-54, 1998 | 134 | 1998 |
Reading Between the Lines: Lessons from the {SDMI} Challenge SA Craver, M Wu, B Liu, B Swartzlander, DS Wallach, D Dean, EW Felten 10th USENIX Security Symposium (USENIX Security 01), 2001 | 132 | 2001 |
On the invertibility of invisible watermarking techniques S Craver, N Memon, BL Yeo, MM Yeung Proceedings of international conference on image processing 1, 540-543, 1997 | 111 | 1997 |
What can we reasonably expect from watermarks? SA Craver, M Wu, B Liu Proceedings of the 2001 IEEE Workshop on the Applications of Signal …, 2001 | 50 | 2001 |
Copyright protection protocols based on asymmetric watermarking: The ticket concept S Craver, S Katzenbeisser Communications and Multimedia Security Issues of the New Century: IFIP TC6 …, 2001 | 49 | 2001 |
Security analysis of public key watermarking schemes SA Craver, S Katzenbeisser Mathematics of Data/Image Coding, Compression, and Encryption IV, with …, 2001 | 45 | 2001 |
Analysis of attacks on SDMI audio watermarks M Wu, S Craver, EW Felten, B Liu 2001 IEEE International Conference on Acoustics, Speech, and Signal …, 2001 | 45 | 2001 |
Multilinearization data structure for image browsing SA Craver, BL Yeo, MM Yeung Storage and Retrieval for Image and Video Databases VII 3656, 155-166, 1998 | 38 | 1998 |
Toward the identification of DSLR lenses by chromatic aberration J Yu, S Craver, E Li Media Watermarking, Security, and Forensics III 7880, 373-381, 2011 | 19 | 2011 |
A supraliminal channel in a videoconferencing application S Craver, E Li, J Yu, I Atakli Information Hiding: 10th International Workshop, IH 2008, Santa Barbara, CA …, 2008 | 18 | 2008 |
A supraliminal channel in a wireless phone application E Li, S Craver Proceedings of the 11th ACM workshop on Multimedia and security, 151-154, 2009 | 16 | 2009 |
An implementation of, and attacks on, zero-knowledge watermarking S Craver, B Liu, W Wolf Information Hiding: 6th International Workshop, IH 2004, Toronto, Canada …, 2005 | 14 | 2005 |
Lessons learned from SDMI S Craver, JP Stern 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No. 01TH8564 …, 2001 | 14 | 2001 |
Robustness of copyright marking systems S Craver, A Perrig, FAP Petitcolas Information hiding techniques for steganography and digital watermarking, 2000 | 14 | 2000 |
Additive attacks on speaker recognition AF Baroughi, S Craver Media Watermarking, Security, and Forensics 2014 9028, 269-281, 2014 | 10 | 2014 |