2008 |
10 | EE | Scott Craver,
Enping Li,
Jun Yu,
Idris M. Atakli:
A Supraliminal Channel in a Videoconferencing Application.
Information Hiding 2008: 283-293 |
2006 |
9 | EE | Janice Y. Tsai,
Lorrie Faith Cranor,
Scott Craver:
Vicarious infringement creates a privacy ceiling.
Digital Rights Management Workshop 2006: 9-18 |
8 | EE | Scott Craver:
An Improved Asymmetric Watermarking System Using Matrix Embedding.
Information Hiding 2006: 15-25 |
2004 |
7 | EE | Scott Craver,
Bede Liu,
Wayne Wolf:
An Implementation of, and Attacks on, Zero-Knowledge Watermarking.
Information Hiding 2004: 1-12 |
2002 |
6 | EE | Scott Craver,
Bede Liu,
Wayne Wolf:
Detectors for Echo Hiding Systems.
Information Hiding 2002: 247-257 |
2001 |
5 | | Stefan Katzenbeisser,
Scott Craver:
Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept.
Communications and Multimedia Security 2001 |
1999 |
4 | | Scott Craver:
Zero Knowledge Watermark Detection.
Information Hiding 1999: 101-116 |
1998 |
3 | EE | Scott Craver:
On Public-Key Steganography in the Presence of an Active Warden.
Information Hiding 1998: 355-368 |
2 | EE | Scott Craver,
Boon-Lock Yeo,
Minerva M. Yeung:
Technical Trials and Legal Tribulations.
Commun. ACM 41(7): 44-54 (1998) |
1997 |
1 | | Scott Craver,
Nasir D. Memon,
Boon-Lock Yeo,
Minerva M. Yeung:
Can Invisible Watermarks Resolve Rightful Ownerships?
Storage and Retrieval for Image and Video Databases (SPIE) 1997: 310-321 |