Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information
暂无分享,去创建一个
[1] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[2] Jessica Staddon,et al. Efficient Traitor Tracing Algorithms Using List Decoding , 2001, ASIACRYPT.
[3] Jessica Staddon,et al. Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.
[4] Alexander Barg,et al. Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.
[5] Birgit Pfitzmann,et al. Error- and Collusion-Secure Fingerprinting for Digital Data , 1999, Information Hiding.
[6] Jack K. Wolf,et al. Efficient maximum likelihood decoding of linear block codes using a trellis , 1978, IEEE Trans. Inf. Theory.
[7] Miguel Soriano,et al. Soft-decision tracing in fingerprinted multimedia content , 2004, IEEE MultiMedia.
[8] Jr. G. Forney,et al. The viterbi algorithm , 1973 .
[9] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[10] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[11] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) , 1995, CRYPTO.
[12] Dan. Collusion-Secure Fingerprinting for Digital Data , 2002 .
[13] Alexander Vardy,et al. Algebraic soft-decision decoding of Reed-Solomon codes , 2003, IEEE Trans. Inf. Theory.
[14] Reihaneh Safavi-Naini,et al. Collusion Secure q-ary Fingerprinting for Perceptual Content , 2001, Digital Rights Management Workshop.
[15] Aggelos Kiayias,et al. On Crafty Pirates and Foxy Tracers , 2001, Digital Rights Management Workshop.
[16] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[17] Carl-Erik W. Sundberg,et al. List Viterbi decoding algorithms with applications , 1994, IEEE Trans. Commun..
[18] S CollbergChristian,et al. Watermarking, tamper-proffing, and obfuscation , 2002 .
[19] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[20] Amos Fiat,et al. Tracing Traitors , 1994, CRYPTO.
[21] Jörg Schwenk,et al. Combining digital watermarks and collusion-secure fingerprints for digital images , 1999, Electronic Imaging.
[22] Hyoung Joong Kim,et al. Modified patchwork algorithm: a novel audio watermarking scheme , 2003, IEEE Trans. Speech Audio Process..
[23] Jessica Staddon,et al. Applications of list decoding to tracing traitors , 2003, IEEE Trans. Inf. Theory.
[24] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[25] Min Wu,et al. Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..
[26] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.
[27] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..