Identification of traitors in algebraic-geometric traceability codes
暂无分享,去创建一个
[1] Alexander Vardy,et al. Algebraic soft-decision decoding of Reed-Solomon codes , 2003, IEEE Trans. Inf. Theory.
[2] Reihaneh Safavi-Naini,et al. Collusion Secure q-ary Fingerprinting for Perceptual Content , 2001, Digital Rights Management Workshop.
[3] Tran van Trung,et al. On a Class of Traceability Codes , 2004, Des. Codes Cryptogr..
[4] Jessica Staddon,et al. Efficient Traitor Tracing Algorithms Using List Decoding , 2001, ASIACRYPT.
[5] Jessica Staddon,et al. Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.
[6] Henning Stichtenoth,et al. Algebraic function fields and codes , 1993, Universitext.
[7] Venkatesan Guruswami,et al. Improved decoding of Reed-Solomon and algebraic-geometry codes , 1999, IEEE Trans. Inf. Theory.
[8] Alexander Barg,et al. Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.
[9] Jörg Schwenk,et al. Combining digital watermarks and collusion-secure fingerprints for digital images , 1999, Electronic Imaging.
[10] Kannan Ramchandran,et al. Capacity issues in digital image watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[11] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[12] Venkatesan Guruswami,et al. List decoding of error correcting codes , 2001 .
[13] Reihaneh Safavi-Naini,et al. New results on frame-proof codes and traceability schemes , 2001, IEEE Trans. Inf. Theory.
[14] Birgit Pfitzmann,et al. Error- and Collusion-Secure Fingerprinting for Digital Data , 1999, Information Hiding.
[15] Christian S. Collberg,et al. Watermarking, Tamper-Proofing, and Obfuscation-Tools for Software Protection , 2002, IEEE Trans. Software Eng..
[16] Hyoung Joong Kim,et al. Modified Patchwork Algorithm: a novel audio watermarking scheme , 2001, Proceedings International Conference on Information Technology: Coding and Computing.
[17] Jessica Staddon,et al. Applications of list decoding to tracing traitors , 2003, IEEE Trans. Inf. Theory.
[18] Amos Fiat,et al. Tracing traitors , 2000, IEEE Trans. Inf. Theory.
[19] Jacobus H. van Lint,et al. Generalized Reed - Solomon codes from algebraic geometry , 1987, IEEE Trans. Inf. Theory.
[20] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..