Analysis of Boneh-Shaw Finger Printing Codes under Majority Value Collusion Attacks
暂无分享,去创建一个
[1] Min Wu,et al. Collusion-Resistant Video Fingerprinting for Large User Group , 2007, IEEE Trans. Inf. Forensics Secur..
[2] C. A. Dhote,et al. A Survey Of Digital Watermarking Techniques , 2015 .
[3] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[4] Josep Domingo-Ferrer,et al. Short 3-Secure Fingerprinting Codes for Copyright Protection , 2002, ACISP.
[5] A. Sudha,et al. Efficient Analysis And Secure Client Side Image Using Fingerprint Embedding , 2014 .
[6] Josep Domingo-Ferrer,et al. Short collusion-secure fingerprints based on dual binary Hamming codes , 2000 .
[7] Hans Georg Schaathun,et al. The Boneh-Shaw fingerprinting scheme is better than we thought , 2006, IEEE Transactions on Information Forensics and Security.
[8] Hans Georg Schaathun,et al. On Watermarking/fingerprinting for Copyright Protection , 2022 .
[9] Gérard D. Cohen,et al. Binary Codes for Collusion-Secure Fingerprinting , 2001, ICISC.
[10] Juan Hernández-Serrano,et al. Multimedia Copyright Protection Platform Demonstrator , 2005, iTrust.
[11] Stefan Katzenbeisser,et al. Collusion-Secure Fingerprint Watermarking for Real World Applications , 2010, Sicherheit.
[12] Abhi Shelat,et al. Lower bounds for collusion-secure fingerprinting , 2003, SODA '03.