Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
暂无分享,去创建一个
[1] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[2] H. Vincent Poor,et al. An introduction to signal detection and estimation (2nd ed.) , 1994 .
[3] Deepa Kundur,et al. Statistical invisibility for collusion-resistant digital video watermarking , 2005, IEEE Transactions on Multimedia.
[4] Yongdong Wu. Nonlinear collusion attack on a watermarking scheme for buyer authentication , 2006, IEEE Trans. Multim..
[5] Bernd Girod,et al. Capacity of digital watermarks subjected to an optimal collusion attack , 2000, 2000 10th European Signal Processing Conference.
[6] Min Wu,et al. Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia , 2007, 2007 IEEE International Conference on Image Processing.
[7] K. J. Ray Liu,et al. Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization , 2006, IEEE Transactions on Information Forensics and Security.
[8] Deepa Kundur,et al. Spatially localized image-dependent watermarking for statistical invisibility and collusion resistance , 2005, IEEE Transactions on Multimedia.
[9] Min Wu,et al. Collusion-resistant fingerprinting for multimedia , 2002, IEEE Signal Processing Magazine.
[10] Min Wu,et al. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.
[11] Hayder Radha,et al. Statistical analysis and distortion modeling of MPEG-4 FGS , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[12] Aaas News,et al. Book Reviews , 1893, Buffalo Medical and Surgical Journal.
[13] Min Wu,et al. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.
[14] K. J. Ray Liu,et al. Behavior forensics for scalable multiuser collusion: fairness versus effectiveness , 2006, IEEE Transactions on Information Forensics and Security.
[15] K. J. Ray Liu,et al. Multimedia Fingerprinting Forensics for Traitor Tracing , 2005 .
[16] Tihao Chiang,et al. A new rate control scheme using quadratic rate distortion model , 1997, IEEE Trans. Circuits Syst. Video Technol..
[17] Min Wu,et al. Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..
[18] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[19] Thomas Hofmann,et al. Kernel Methods for Missing Variables , 2005, AISTATS.
[20] James T. Kwok,et al. A regularization framework for multiple-instance learning , 2006, ICML.