{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:37:41Z","timestamp":1743086261612,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":63,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540922377"},{"type":"electronic","value":"9783540922384"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-92238-4_2","type":"book-chapter","created":{"date-parts":[[2008,12,16]],"date-time":"2008-12-16T11:04:33Z","timestamp":1229425473000},"page":"2-18","source":"Crossref","is-referenced-by-count":9,"title":["The Marriage of Cryptography and Watermarking \u2014 Beneficial and Challenging for Secure Watermarking and Detection"],"prefix":"10.1007","author":[{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"4C Entity, LLC. CPPM specification\u2014introduction and common cryptographic elements. Specification Revision 1.0, January 17 (2003), http:\/\/www.4centity.com\/data\/tech\/spec\/cppm-base100.pdf"},{"key":"2_CR2","unstructured":"AACS Licensing Administrator. Advanced access content system (AACS): Introduction and common cryptographic elements. Specification Revision 0.90, April 14 (2005), http:\/\/www.aacsla.com\/specifications\/AACS_Spec-Common_0.90.pdf"},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/11780656_12","volume-title":"Information Security and Privacy","author":"A. Adelsbach","year":"2006","unstructured":"Adelsbach, A., Huber, U., Sadeghi, A.-R.: Fingercasting\u2014joint fingerprinting and decryption of broadcast messages. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 136\u2013147. Springer, Heidelberg (2006)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Adelsbach, A., Katzenbeisser, S., Sadeghi, A.-R.: Watermark detection with zero-knowledge disclosure. ACM Multimedia Systems Journal, Special Issue on Multimedia Security (2003)","DOI":"10.1007\/s00530-003-0098-z"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-540-74124-4_10","volume-title":"Information Hiding","author":"A. Adelsbach","year":"2007","unstructured":"Adelsbach, A., Katzenbeisser, S., Sadeghi, A.-R.: A computational model for watermark robustness. In: Camenisch, J., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol.\u00a04437, pp. 145\u2013160. Springer, Heidelberg (2007)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Adelsbach, A., Rohe, M., Sadeghi, A.-R.: Overcoming the obstacles of zero-knowledge watermark detection. In: Proceedings of ACM Multimedia Security Workshop, pp. 46\u201355 (2004)","DOI":"10.1145\/1022431.1022441"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Adelsbach, A., Rohe, M., Sadeghi, A.-R.: Towards multilateral secure digital rights distribution infrastructures. In: ACM DRM Workshop 2005 (2005)","DOI":"10.1145\/1102546.1102556"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45496-9_20","volume-title":"Information Hiding","author":"A. Adelsbach","year":"2001","unstructured":"Adelsbach, A., Sadeghi, A.-R.: Zero-knowledge watermark detection and proof of ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol.\u00a02137, pp. 273\u2013288. Springer, Heidelberg (2001)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Adelsbach, A., Sadeghi, A.-R.: Advanced techniques for dispute resolving and authorship proofs on digital works. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents V, vol.\u00a05020 (2003)","DOI":"10.1117\/12.477295"},{"key":"2_CR10","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"R.J. Anderson","year":"2001","unstructured":"Anderson, R.J.: Security Engineering: A Guide to Building Dependable Distributed Systems, 1st edn. John Wiley, Chichester (2001)","edition":"1"},{"key":"2_CR11","unstructured":"Anderson, R.J., Kuhn, M.: Tamper resistance\u2014a cautionary note. In: Tygar, D. (ed.) USENIX Electronic Commerce 1996, pp. 1\u201311. USENIX (1996)"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/BFb0052339","volume-title":"Fast Software Encryption","author":"R.J. Anderson","year":"1997","unstructured":"Anderson, R.J., Manifavas, C.: Chameleon\u2014a new kind of stream cipher. In: Biham, E. (ed.) FSE 1997. LNCS, vol.\u00a01267, pp. 107\u2013113. Springer, Heidelberg (1997)"},{"issue":"5","key":"2_CR13","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory\u00a044(5), 1897\u20131905 (1998)","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/3-540-45539-6_31","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"F. Boudot","year":"2000","unstructured":"Boudot, F.: Efficient proofs that a committed number lies in an interval. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 431\u2013444. Springer, Heidelberg (2000)"},{"issue":"2","key":"2_CR15","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/0022-0000(88)90005-0","volume":"37","author":"G. Brassard","year":"1988","unstructured":"Brassard, G., Chaum, D., Cr\u00e9peau, C.: Minimum disclosure proofs of knowledge. Journal of Computer and System Sciences\u00a037(2), 156\u2013189 (1988)","journal-title":"Journal of Computer and System Sciences"},{"key":"2_CR16","first-page":"22","volume-title":"ACM EC 1999","author":"B. Briscoe","year":"1999","unstructured":"Briscoe, B., Fairman, I.: Nark: Receiver-based multicast non-repudiation and key management. In: ACM EC 1999, pp. 22\u201330. ACM Press, New York (1999)"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-540-46703-8_18","volume-title":"Networked Group Communication","author":"I. Brown","year":"1999","unstructured":"Brown, I., Perkins, C., Crowcroft, J.: Watercasting: Distributed watermarking of multicast media. In: Rizzo, L., Fdida, S. (eds.) NGC 1999. LNCS, vol.\u00a01736, pp. 286\u2013300. Springer, Heidelberg (1999)"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Celik, M.U., Lemma, A.N., Katzenbeisser, S., van der Veen, M.: Secure embedding of spread spectrum watermarks using look-up-tables. In: ICASSP 2007 [43] (2007)","DOI":"10.1109\/ICASSP.2007.366195"},{"key":"2_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Advances in Cryptology - CRYPTO \u201994","author":"B. Chor","year":"1994","unstructured":"Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Desmedt, Y. (ed.) CRYPTO 1994. LNCS, vol.\u00a0839, pp. 257\u2013270. Springer, Heidelberg (1994)"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/3-540-61996-8_41","volume-title":"Information Hiding","author":"I. Cox","year":"1996","unstructured":"Cox, I., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. In: Anderson, R. (ed.) IH 1996. LNCS, vol.\u00a01174, pp. 175\u2013190. Springer, Heidelberg (1996)"},{"key":"2_CR21","volume-title":"Digital Watermarking","author":"I. Cox","year":"2002","unstructured":"Cox, I., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, San Francisco (2002)"},{"issue":"12","key":"2_CR22","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"4","key":"2_CR23","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/49.668980","volume":"16","author":"I.J. Cox","year":"1998","unstructured":"Cox, I.J., Linnartz, J.-P.M.G.: Some general methods for tampering with watermarks. IEEE Journal on Selected Areas in Communications\u00a016(4), 587\u2013593 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Craver, S.: Zero knowledge watermark detection. In: Pfitzmann (ed.) [59], pp. 101\u2013116.","DOI":"10.1007\/10719724_8"},{"key":"2_CR25","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/978-0-387-35413-2_15","volume-title":"Communications and Multimedia Security Issues of the New Century","author":"S. Craver","year":"2001","unstructured":"Craver, S., Katzenbeisser, S.: Copyright protection protocols based on asymmetric watermarking: The ticket concept. In: Communications and Multimedia Security Issues of the New Century, pp. 159\u2013170. Kluwer Academic Publishers, Dordrecht (2001)"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Craver, S., Katzenbeisser, S.: Security analysis of public-key watermarking schemes. In: Proceedings of SPIE, Mathematics of Data\/Image Coding, Compression and Encryption IV, with Applications, vol.\u00a04475, pp. 172\u2013182 (2001)","DOI":"10.1117\/12.449579"},{"key":"2_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-30114-1_1","volume-title":"Information Hiding","author":"S. Craver","year":"2004","unstructured":"Craver, S., Liu, B., Wolf, W.: An implementation of, and attacks on, zero-knowledge watermarking. In: Fridrich, J.J. (ed.) IH 2004. LNCS, vol.\u00a03200, pp. 1\u201312. Springer, Heidelberg (2004)"},{"key":"2_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/3-540-48969-X_3","volume-title":"Lectures on Data Security","author":"I. Damg\u00e5rd","year":"1999","unstructured":"Damg\u00e5rd, I.: Commitment schemes and zero-knowledge protocols. In: Damg\u00e5rd, I.B. (ed.) EEF School 1998. LNCS, vol.\u00a01561, pp. 63\u201386. Springer, Heidelberg (1999)"},{"key":"2_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/3-540-36178-2_8","volume-title":"Advances in Cryptology - ASIACRYPT 2002","author":"I. Damg\u00e5rd","year":"2002","unstructured":"Damg\u00e5rd, I., Fujisaki, E.: A statistically-hiding integer commitment scheme based on groups with hidden order. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol.\u00a02501, pp. 125\u2013142. Springer, Heidelberg (2002)"},{"key":"2_CR30","volume-title":"Sicherheit in Netzen und Medienstr\u00f6men","author":"J.J. Eggers","year":"2000","unstructured":"Eggers, J.J., Su, J.K., Girod, B.: Asymmetric watermarking schemes. In: Sicherheit in Netzen und Medienstr\u00f6men, September 2000, Springer Reihe, Informatik Aktuell (2000)"},{"key":"2_CR31","unstructured":"Eggers, J.J., Su, J.K., Girod, B.: Public key watermarking by eigenvectors of linear transforms. In: Proceedings of the European Signal Processing Conference (2000)"},{"key":"2_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/3-540-48910-X_10","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"F. Erg\u00fcn","year":"1999","unstructured":"Erg\u00fcn, F., Kilian, J., Kumar, R.: A note on the limits of collusion-resistant watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 140\u2013149. Springer, Heidelberg (1999)"},{"key":"2_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/10718964_19","volume-title":"Information Security and Privacy","author":"N. Ferguson","year":"2000","unstructured":"Ferguson, N., Schneier, B., Wagner, D.: Security weaknesses in a randomized stream cipher. In: Dawson, E., Clark, A., Boyd, C. (eds.) ACISP 2000. LNCS, vol.\u00a01841, pp. 234\u2013241. Springer, Heidelberg (2000)"},{"key":"2_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Advances in Cryptology - CRYPTO \u201993","author":"A. Fiat","year":"1994","unstructured":"Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol.\u00a0773, pp. 480\u2013491. Springer, Heidelberg (1994)"},{"key":"2_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/BFb0052225","volume-title":"Advances in Cryptology - CRYPTO \u201997","author":"E. Fujisaki","year":"1997","unstructured":"Fujisaki, E., Okamoto, E.: Statistical zero knowledge protocols to prove modular polynomial relations. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol.\u00a01294, pp. 16\u201330. Springer, Heidelberg (1997)"},{"key":"2_CR36","unstructured":"Fujisaki, E., Okamoto, T.: Statistical zero-knowledge protocols to prove modular relations. IEICE Transactions on Fundamentals, E82-A(1):81\u201392 (Jan 1999)"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Furon, T., Duhamel, P.: An asymmetric public detection watermarking technique. In: Pfitzmann [59], pp. 88\u2013100","DOI":"10.1007\/10719724_7"},{"key":"2_CR38","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography, volume Basic Tools","author":"O. Goldreich","year":"2001","unstructured":"Goldreich, O.: Foundations of Cryptography, volume Basic Tools. Cambridge University Press, Cambridge (2001)"},{"issue":"3","key":"2_CR39","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1145\/116825.116852","volume":"38","author":"O. Goldreich","year":"1991","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. Journal of the ACM\u00a038(3), 690\u2013728 (1991)","journal-title":"Journal of the ACM"},{"key":"2_CR40","first-page":"291","volume-title":"Proceedings of the 17th Annual Symposium on Theory of Computing (STOC)","author":"S. Goldwasser","year":"1985","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. In: Proceedings of the 17th Annual Symposium on Theory of Computing (STOC), Providence, RI, USA, May 1985, pp. 291\u2013304. ACM Press, New York (1985)"},{"key":"2_CR41","unstructured":"Gopalakrishnan, K., Memon, N., Vora, P.: Protocols for watermark verification. In: Multimedia and Security, Workshop at ACM Multimedia, pp. 91\u201394 (1999)"},{"key":"2_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-45708-9_4","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"D. Halevy","year":"2002","unstructured":"Halevy, D., Shamir, A.: The LSD broadcast encryption scheme. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 47\u201360. Springer, Heidelberg (2002)"},{"key":"2_CR43","doi-asserted-by":"crossref","unstructured":"IEEE International Conference on Acoustics, Speech and Signal Processing\u2014ICASSP 2007, Honolulu, Hawaii, USA, April 15\u201320, 2007. IEEE Computer Society, Los Alamitos (2007)","DOI":"10.1109\/TIP.2006.878464"},{"key":"2_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/11426639_33","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"N.-S. Jho","year":"2005","unstructured":"Jho, N.-S., Hwang, J.Y., Cheon, J.H., Kim, M.-H., Lee, D.H., Yoo, E.S.: One-way chain based broadcast encryption schemes. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 559\u2013574. Springer, Heidelberg (2005)"},{"key":"2_CR45","unstructured":"Katzenbeisser, S.: Computational security models for digital watermarks (April 2005)"},{"key":"2_CR46","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Skoric, B., Celik, M., Sadeghi, A.-R.: Combining tardos fingerprinting codes and fingercasting. In: Information Hiding conference 2007 (2007)","DOI":"10.1007\/978-3-540-77370-2_20"},{"key":"2_CR47","unstructured":"Kilian, J., Leighton, F.T., Matheson, L.R., Shamoon, T.G., Tarjan, R.E., Zane, F.: Resistance of digital watermarks to collusive attacks. Technical Report TR-585-98, Princeton University, Department of Computer Science, July\u00a027 (1998), ftp:\/\/ftp.cs.princeton.edu\/techreports\/1998\/585.ps.gz"},{"issue":"6","key":"2_CR48","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1109\/JPROC.2004.827356","volume":"92","author":"D. Kundur","year":"2004","unstructured":"Kundur, D., Karthik, K.: Video fingerprinting and encryption principles for digital rights management. Proceedings of the IEEE\u00a092(6), 918\u2013932 (2004)","journal-title":"Proceedings of the IEEE"},{"key":"2_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/3-540-49380-8_18","volume-title":"Information Hiding","author":"J.-P.M.G. Linnartz","year":"1998","unstructured":"Linnartz, J.-P.M.G., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol.\u00a01525, pp. 258\u2013272. Springer, Heidelberg (1998)"},{"key":"2_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1007\/978-3-540-40061-5_26","volume-title":"Advances in Cryptology - ASIACRYPT 2003","author":"H. Lipmaa","year":"2003","unstructured":"Lipmaa, H.: On diophantine complexity and statistical zero-knowledge arguments. In: Laih, C.S. (ed.) ASIACRYPT 2003. LNCS, vol.\u00a02894, pp. 398\u2013415. Springer, Heidelberg (2003)"},{"key":"2_CR51","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"477","DOI":"10.1007\/3-540-36228-2_59","volume-title":"Advances in Multimedia Information Processing - PCM 2002","author":"Y. Liu","year":"2002","unstructured":"Liu, Y., Gao, W., Yao, H., Song, Y.: Secure watermark verification scheme. In: Chen, Y.-C., Chang, L.-W., Hsu, C.-T. (eds.) PCM 2002. LNCS, vol.\u00a02532, pp. 477\u2013484. Springer, Heidelberg (2002)"},{"key":"2_CR52","first-page":"113","volume-title":"ITCC (2)","author":"Y. Liu","year":"2005","unstructured":"Liu, Y., Yang, X., Yao, H., Huang, T., Gao, W.: Watermark detection schemes with high security. In: ITCC (2), pp. 113\u2013117. IEEE Computer Society Press, Los Alamitos (2005)"},{"issue":"5","key":"2_CR53","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1109\/MCOM.2005.1452834","volume":"43","author":"W. Luh","year":"2005","unstructured":"Luh, W., Kundur, D.: New paradigms for effective multicasting and fingerprinting of entertainment media. IEEE Communications Magazine\u00a043(5), 77\u201384 (2005)","journal-title":"IEEE Communications Magazine"},{"issue":"1","key":"2_CR54","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/BF00191321","volume":"5","author":"U. Maurer","year":"1992","unstructured":"Maurer, U.: Conditionally-perfect secrecy and a provably-secure randomized cipher. Journal of Cryptology\u00a05(1), 53\u201366 (1992)","journal-title":"Journal of Cryptology"},{"key":"2_CR55","series-title":"Lecture Notes in Computer Science","first-page":"361","volume-title":"EUROCRYPT 1990","author":"U.M. Maurer","year":"1990","unstructured":"Maurer, U.M.: A provably-secure strongly-randomized cipher. In: Damgard, I. (ed.) EUROCRYPT 1990. LNCS, vol.\u00a0473, pp. 361\u2013373. Springer, Heidelberg (1990)"},{"key":"2_CR56","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/3-540-44647-8_3","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Naor","year":"2001","unstructured":"Naor, D., Naor, M., Lotspiech, J.: Revocation and tracing schemes for stateless receivers. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 41\u201362. Springer, Heidelberg (2001)"},{"key":"2_CR57","doi-asserted-by":"crossref","unstructured":"Naor, M., Pinkas, B.: Threshold traitor tracing. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 502\u2013517. Springer (1998)","DOI":"10.1007\/BFb0055750"},{"key":"2_CR58","doi-asserted-by":"crossref","unstructured":"Parviainen, R., Parnes, P.: Large scale distributed watermarking of multicast media through encryption. In: Steinmetz, R., Dittmann, J., Steinebach, M. (eds.) Communications and Multimedia Security (CMS 2001). IFIP Conference Proceedings, vol.\u00a0192, pp. 149\u2013158. International Federation for Information Processing, Communications and Multimedia Security (IFIP), Kluwer (2001)","DOI":"10.1007\/978-0-387-35413-2_14"},{"key":"2_CR59","series-title":"Lecture Notes in Computer Science","volume-title":"Information Hiding","year":"2000","unstructured":"Pfitzmann, A. (ed.): IH 1999. LNCS, vol.\u00a01768. Springer, Heidelberg (2000)"},{"key":"2_CR60","doi-asserted-by":"crossref","unstructured":"Tardos., G.: Optimal probabilistic fingerprint codes. In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC), pp. 116\u2013125 (2003)","DOI":"10.1145\/780559.780561"},{"key":"2_CR61","unstructured":"D.\u00a0S. Touretzky. Gallery of CSS descramblers. Webpage, Computer Science Department of Carnegie Mellon University (2000) (November 17, 2005), http:\/\/www.cs.cmu.edu\/~dst\/DeCSS\/Gallery"},{"key":"2_CR62","doi-asserted-by":"crossref","unstructured":"van Schyndel, R.G., Tirkel, A.Z., Svalbe, I.D.: Key independent watermark detection. In: Proceedings of the IEEE International Conference on Multimedia Computing and Systems, vol.\u00a01 (1999)","DOI":"10.1109\/MMCS.1999.779265"},{"key":"2_CR63","series-title":"Lecture Notes in Computer Science","first-page":"204","volume-title":"IWDW 2004","author":"X. Zhao","year":"2004","unstructured":"Zhao, X., Dai, Y., Feng, D.: A generalized method for constructing and proving zero-knowledge watermark proof systems. In: Cox, I.J., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol.\u00a03304, pp. 204\u2013217. Springer, Heidelberg (2004)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-92238-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:57:47Z","timestamp":1738821467000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-92238-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540922377","9783540922384"],"references-count":63,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-92238-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}