Back to Results
First PageMeta Content
Digital audio / Watermark / Transmission Control Protocol / Latency / Network packet / Information / Paper / Printing / Watermarking / Digital watermarking / Audio watermark detection


On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques∗ Pai Peng Peng Ning Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science
Add to Reading List

Document Date: 2011-11-09 13:26:14


Open Document

File Size: 303,27 KB

Share Result on Facebook

City

Timing / /

Facility

Computer Science North Carolina State University / /

IndustryTerm

trace-back systems / campus network / watermark duplication algorithm / computing / minimax solution / duplication algorithm / agglomerative algorithm / /

Organization

MIT / U.S. Government / Timing-Based Active Watermarking Trace-Back Techniques∗ Pai Peng Peng Ning Douglas S. Reeves Cyber Defense Laboratory Department of Computer Science North Carolina State University Raleigh / /

Person

Douglas S. Reeves Cyber / /

Position

tackle / General / /

ProvinceOrState

North Carolina / /

Technology

encryption / SPRT algorithm / clustering algorithm / GEM algorithm / generalized EM algorithm / simulation / duplication algorithm / EM algorithm / agglomerative algorithm / watermark duplication algorithm / /

URL

http /

SocialTag