Continuous media fingerprinting against time-varying collusion attacks
暂无分享,去创建一个
[1] P. Noll,et al. MPEG digital audio coding , 1997, IEEE Signal Process. Mag..
[2] B. Sklar,et al. Rayleigh Fading Channels in Mobile Digital Communication Systems Part II: Mitigation , 1997, IEEE Communications Magazine.
[3] M. Angela Sasse,et al. Measuring perceived quality of speech and video in multimedia conferencing applications , 1998, MULTIMEDIA '98.
[4] SklarB.. Rayleigh Fading Channels in Mobile Digital Communication Systems Part II , 1997 .
[5] C.-C.J. Kuo,et al. Design of Multiuser Collusion-Free Hiding Codes with Delayed Embedding , 2007 .
[6] David Tse,et al. Linear Multiuser Receivers: Effective Interference, Effective Bandwidth and User Capacity , 1999, IEEE Trans. Inf. Theory.
[7] C.-C. Jay Kuo,et al. Collusion-Resistant Fingerprinting Systems: Review and Recent Results , 2010, Trans. Data Hiding Multim. Secur..
[8] Bernd Girod,et al. Capacity of digital watermarks subjected to an optimal collusion attack , 2000, 2000 10th European Signal Processing Conference.
[9] C.-C. Jay Kuo,et al. Design of Collusion-Free Codes Based on MAI-Free Principle , 2006, 2006 International Conference on Intelligent Information Hiding and Multimedia.
[10] Hong Liu,et al. Attack and improvement of the joint fingerprinting and decryption method for vector quantization images , 2014, Signal Process..
[11] John Princen,et al. Analysis/Synthesis filter bank design based on time domain aliasing cancellation , 1986, IEEE Trans. Acoust. Speech Signal Process..
[12] John D. Villasenor,et al. Visibility of wavelet quantization noise , 1997, IEEE Transactions on Image Processing.
[13] John G. Proakis,et al. Digital Communications , 1983 .
[14] K. J. Ray Liu,et al. Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization , 2006, IEEE Transactions on Information Forensics and Security.
[15] Andrew B. Watson,et al. DCT quantization matrices visually optimized for individual images , 1993, Electronic Imaging.
[16] Lajos Hanzo,et al. OFDM and MC-CDMA for Broadband Multi-User Communications, WLANs and Broadcasting , 2003 .
[17] J.B. Allen,et al. A unified approach to short-time Fourier analysis and synthesis , 1977, Proceedings of the IEEE.
[18] C.-C. Jay Kuo,et al. Analysis of time-varying collusion attacks in fingerprinting systems: Capacity and throughput , 2009, 2009 IEEE International Symposium on Circuits and Systems.
[19] K. J. Ray Liu,et al. Multimedia Fingerprinting Forensics for Traitor Tracing , 2005 .
[20] Min Wu,et al. Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..
[21] Asifullah Khan,et al. A recent survey of reversible watermarking techniques , 2014, Inf. Sci..
[22] Yacov Yacobi,et al. Improved Boneh-Shaw Content Fingerprinting , 2001, CT-RSA.
[23] Julius O. Smith,et al. Audio representations for data compression and compressed domain processing , 1998 .
[24] Julius O. Smith,et al. Audio Watermarking through Deterministic plus Stochastic Signal Decomposition , 2007, EURASIP J. Inf. Secur..
[25] C.-C. Jay Kuo,et al. Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks , 2009, IEEE Transactions on Information Forensics and Security.
[26] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[27] Malay Kumar Kundu,et al. Perceptually adaptive spread transform image watermarking scheme using Hadamard transform , 2011, Information Sciences.
[28] Min Wu,et al. Group-Oriented Fingerprinting for Multimedia Forensics , 2004, EURASIP J. Adv. Signal Process..
[29] Franco Zambonelli,et al. A biochemical approach to adaptive service ecosystems , 2010, Inf. Sci..
[30] C.-C. Jay Kuo,et al. Design of Collusion-Free Hiding Codes using MAI-Free Principle , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[31] Gwenaël J Doërr,et al. Video watermarking : overview and challenges , 2003 .
[32] Vincenzo Moscato,et al. Towards a user based recommendation strategy for digital ecosystems , 2013, Knowl. Based Syst..
[33] David Tse,et al. Fundamentals of Wireless Communication , 2005 .
[34] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[35] C.-C. Jay Kuo,et al. Design and Analysis of High-Capacity Anti-Collusion Hiding Codes , 2008 .
[36] Joseph A. O'Sullivan,et al. Information-theoretic analysis of information hiding , 2003, IEEE Trans. Inf. Theory.
[37] D. Kirovski,et al. Fingerprinting and forensic analysis of multimedia , 2004, MULTIMEDIA '04.
[38] Pierre Moulin,et al. Data-Hiding Codes , 2005, Proceedings of the IEEE.
[39] Joe Kilian,et al. A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.
[40] Wei Liu,et al. Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking , 2007, IEEE Trans. Inf. Forensics Secur..
[41] P. Bello. Characterization of Randomly Time-Variant Linear Channels , 1963 .
[42] Min Wu,et al. Collusion-Resistant Video Fingerprinting for Large User Group , 2007, IEEE Trans. Inf. Forensics Secur..
[43] Wenjun Zeng,et al. Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..
[44] Bernd Girod,et al. Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..
[45] Nazim Fatès,et al. StirMark benchmark: audio watermarking attacks , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[46] P. Moulin,et al. A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[47] Min Wu,et al. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.
[48] Sergio Verdu,et al. Multiuser Detection , 1998 .
[49] B. Sklar,et al. Rayleigh fading channels in mobile digital communication systems Part I: Characterization , 1997, IEEE Commun. Mag..
[50] Pierre Moulin,et al. On Optimal Collusion Strategies for Fingerprinting , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.
[51] Min Wu,et al. Joint coding and embedding techniques for MultimediaFingerprinting , 2006, IEEE Transactions on Information Forensics and Security.
[52] K. J. Ray Liu,et al. Behavior forensics for scalable multiuser collusion: fairness versus effectiveness , 2006, IEEE Transactions on Information Forensics and Security.
[53] C.-C. Jay Kuo,et al. Complexity Reduction of Maximum-Likelihood Multiuser Detection (ML-MUD) Receivers with Carrier Interferometry Codes in MC-CDMA , 2008, 2008 IEEE International Conference on Communications.
[54] C.-C. Jay Kuo,et al. Advanced colluder detection techniques for OSIFT-based hiding codes , 2008, 2008 IEEE International Symposium on Circuits and Systems.
[55] Long Chen,et al. A high capacity and strong robust fingerprinting for compressed images , 2012, Comput. Electr. Eng..
[56] G. Carter,et al. The generalized correlation method for estimation of time delay , 1976 .
[57] Robert J. Safranek,et al. Signal compression based on models of human perception , 1993, Proc. IEEE.