Game-theoretic strategies and equilibriums in multimedia fingerprinting social networks
暂无分享,去创建一个
[1] Yao Wang,et al. Video Processing and Communications , 2001 .
[2] K. J. Ray Liu,et al. Behavior forensics with side information for multimedia fingerprinting social networks , 2009, IEEE Transactions on Information Forensics and Security.
[3] Bernd Girod,et al. Watermarking of uncompressed and compressed video , 1998, Signal Process..
[4] K. J. Ray Liu,et al. Multimedia Fingerprinting Forensics for Traitor Tracing , 2005 .
[5] Francis Zane. Efficient Watermark Detection and Collusion Security , 2000, Financial Cryptography.
[6] Min Wu,et al. Group-Oriented Fingerprinting for Multimedia Forensics , 2004, EURASIP J. Adv. Signal Process..
[7] Jean-Paul M. G. Linnartz,et al. Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..
[8] K. J. Ray Liu,et al. Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization , 2006, IEEE Transactions on Information Forensics and Security.
[9] K.J.R. Liu,et al. Behavior modeling and forensics for multimedia social networks , 2009, IEEE Signal Processing Magazine.
[10] Joe Kilian,et al. A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.
[11] Jörg Schwenk,et al. Combining digital watermarks and collusion secure fingerprints for digital images , 2000, J. Electronic Imaging.
[12] Darko Kirovski,et al. Bounded Gaussian fingerprints and the gradient collusion attack [multimedia fingerprinting applications] , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[13] Jean-Luc Dugelay,et al. Exploiting self-similarities to defeat digital watermarking systems: a case study on still images , 2004, MM&Sec '04.
[14] Yan Sun,et al. “ Network-Aware Security for Group Communications ” , 2010 .
[15] Min Wu,et al. Joint coding and embedding techniques for MultimediaFingerprinting , 2006, IEEE Transactions on Information Forensics and Security.
[16] Nasir D. Memon,et al. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..
[17] Min Wu,et al. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.
[18] K. J. Ray Liu,et al. Scalable multimedia fingerprinting forensics with side information , 2006, 2006 International Conference on Image Processing.
[19] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[20] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[21] Min Wu,et al. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.
[22] Wenjun Zeng,et al. Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..
[23] K. J. Ray Liu,et al. Behavior forensics for scalable multiuser collusion: fairness versus effectiveness , 2006, IEEE Transactions on Information Forensics and Security.