Local and global structure preserving hashing for fast digital fingerprint tracing
暂无分享,去创建一个
Hefei Ling | Hui Feng | Fuhao Zou | Lingyu Yan | Cong Liu | Yunfei Wang
[1] Min Wu,et al. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.
[2] Min Wu,et al. Group-Oriented Fingerprinting for Multimedia Forensics , 2004, EURASIP J. Adv. Signal Process..
[3] J. A. Hartigan,et al. A k-means clustering algorithm , 1979 .
[4] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[5] Wei Liu,et al. Hashing with Graphs , 2011, ICML.
[6] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[7] Min Wu,et al. Performance of detection statistics under collusion attacks on independent multimedia fingerprints , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[8] Geoffrey E. Hinton,et al. Semantic hashing , 2009, Int. J. Approx. Reason..
[9] Ling Huang,et al. Fast approximate spectral clustering , 2009, KDD.
[10] Jun Wang,et al. Self-taught hashing for fast similarity search , 2010, SIGIR.
[11] Jay Yagnik,et al. SPEC hashing: Similarity preserving algorithm for entropy-based coding , 2010, 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition.
[12] Alexander Barg,et al. Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.
[13] Min Wu,et al. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.
[14] Jörg Schwenk,et al. Combining digital watermarks and collusion secure fingerprints for digital images , 2000, J. Electronic Imaging.
[15] Jörg Schwenk,et al. Combining digital watermarks and collusion-secure fingerprints for digital images , 1999, Electronic Imaging.
[16] Xinlei Chen,et al. Large Scale Spectral Clustering with Landmark-Based Representation , 2011, AAAI.
[17] Nicole Immorlica,et al. Locality-sensitive hashing scheme based on p-stable distributions , 2004, SCG '04.
[18] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[19] Antonio Torralba,et al. Spectral Hashing , 2008, NIPS.
[20] Reihaneh Safavi-Naini,et al. A 2-Secure Code with Efficient Tracing Algorithm , 2002, INDOCRYPT.
[21] Jon Louis Bentley,et al. An Algorithm for Finding Best Matches in Logarithmic Expected Time , 1977, TOMS.
[22] Trevor Darrell,et al. Learning to Hash with Binary Reconstructive Embeddings , 2009, NIPS.
[23] C.-C. Jay Kuo,et al. Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks , 2009, IEEE Transactions on Information Forensics and Security.
[24] Rong Jin,et al. Random Projection with Filtering for Nearly Duplicate Search , 2012, AAAI.
[25] Hefei Ling,et al. A Novel Collusion Attack Strategy for Digital Fingerprinting , 2010, IWDW.
[26] Antonin Guttman,et al. R-trees: a dynamic index structure for spatial searching , 1984, SIGMOD '84.
[27] Min Wu,et al. Joint coding and embedding techniques for MultimediaFingerprinting , 2006, IEEE Transactions on Information Forensics and Security.
[28] Wenjun Zeng,et al. A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images , 1999, IEEE Trans. Image Process..
[29] Atsushi Imiya,et al. Fast Spectral Clustering with Random Projection and Sampling , 2009, MLDM.