Tracing illegal redistribution using errors-anderasures and side information decoding algorithms
暂无分享,去创建一个
[1] Min Wu,et al. Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..
[2] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.
[3] Amos Fiat,et al. Tracing Traitors , 1994, CRYPTO.
[4] Jessica Staddon,et al. Applications of list decoding to tracing traitors , 2003, IEEE Trans. Inf. Theory.
[5] Pierre Moulin,et al. Data-Hiding Codes , 2005, Proceedings of the IEEE.
[6] S. Pope,et al. The application of error control to communications , 1987, IEEE Communications Magazine.
[7] F. MacWilliams,et al. The Theory of Error-Correcting Codes , 1977 .
[8] Jessica Staddon,et al. Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.
[9] Jean-Paul M. G. Linnartz,et al. On Codes with the Identifiable Parent Property , 1998, J. Comb. Theory, Ser. A.
[10] Min Wu,et al. Joint coding and embedding techniques for MultimediaFingerprinting , 2006, IEEE Transactions on Information Forensics and Security.
[11] Alexander Barg,et al. Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.
[12] Birgit Pfitzmann,et al. Error- and Collusion-Secure Fingerprinting for Digital Data , 1999, Information Hiding.
[13] Dan. Collusion-Secure Fingerprinting for Digital Data , 2002 .
[14] Alexander Vardy,et al. Algebraic soft-decision decoding of Reed-Solomon codes , 2003, IEEE Trans. Inf. Theory.
[15] Reihaneh Safavi-Naini,et al. Collusion Secure q-ary Fingerprinting for Perceptual Content , 2001, Digital Rights Management Workshop.
[16] Miguel Soriano,et al. Fingerprinting Concatenated Codes with Efficient Identification , 2002, ISC.