Linear combination collusion attack and its application on an anti-collusion fingerprinting [image watermarking]
暂无分享,去创建一个
[1] Douglas R. Stinson,et al. Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes , 1998, SIAM J. Discret. Math..
[2] Min Wu,et al. Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..
[3] Deepa Kundur,et al. Statistical invisibility for collusion-resistant digital video watermarking , 2005, IEEE Transactions on Multimedia.
[4] Darko Kirovski,et al. Replacement Attack on Arbitrary Watermarking Systems , 2002, Digital Rights Management Workshop.
[5] Amos Fiat,et al. Tracing Traitors , 1994, CRYPTO.
[6] Dan. Collusion-Secure Fingerprinting for Digital Data , 2002 .
[7] John G. Proakis,et al. Digital Communications , 1983 .
[8] Joe Kilian,et al. A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.
[9] Matthew K. Franklin,et al. An Efficient Public Key Traitor Tracing Scheme , 1999, CRYPTO.
[10] Michael W. Marcellin,et al. JPEG2000 - image compression fundamentals, standards and practice , 2002, The Kluwer International Series in Engineering and Computer Science.
[11] Moni Naor,et al. Threshold Traitor Tracing , 1998, CRYPTO.
[12] A. Murat Tekalp,et al. Collusion-resilient fingerprinting using random prewarping , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[13] Robert H. Deng,et al. Adaptive Collusion Attack to a Block Oriented Watermarking Scheme , 2003, ICICS.
[14] Reginald L. Lagendijk,et al. Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[15] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[16] Min Wu,et al. Nonlinear collusion attacks on independent fingerprints for multimedia , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[17] Birgit Pfitzmann,et al. Trials of Traced Traitors , 1996, Information Hiding.
[18] Yongdong Wu,et al. An Attack on A Traitor Tracing Scheme , 2001, IACR Cryptol. ePrint Arch..
[19] Yevgeniy Dodis,et al. Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack , 2003, Public Key Cryptography.