Joint coding and embedding techniques for MultimediaFingerprinting
暂无分享,去创建一个
[1] Min Wu,et al. Group-based joint coding and embedding technique for multimedia fingerprinting , 2005, IS&T/SPIE Electronic Imaging.
[2] Min Wu,et al. Group-Oriented Fingerprinting for Multimedia Forensics , 2004, EURASIP J. Adv. Signal Process..
[3] S. Wicker. Error Control Systems for Digital Communication and Storage , 1994 .
[4] Reihaneh Safavi-Naini,et al. Traitor Tracing for Shortened and Corrupted Fingerprints , 2002, Digital Rights Management Workshop.
[5] Tran van Trung,et al. On a Class of Traceability Codes , 2004, Des. Codes Cryptogr..
[6] Reihaneh Safavi-Naini,et al. A 2-Secure Code with Efficient Tracing Algorithm , 2002, INDOCRYPT.
[7] Alexander Barg,et al. Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.
[8] Min Wu,et al. Collusion-resistant fingerprinting for multimedia , 2002, IEEE Signal Processing Magazine.
[9] Francis Zane. Efficient Watermark Detection and Collusion Security , 2000, Financial Cryptography.
[10] Yacov Yacobi,et al. Improved Boneh-Shaw Content Fingerprinting , 2001, CT-RSA.
[11] Miguel Soriano,et al. Soft-decision tracing in fingerprinted multimedia content , 2004, IEEE MultiMedia.
[12] Reihaneh Safavi-Naini,et al. Collusion Secure q-ary Fingerprinting for Perceptual Content , 2001, Digital Rights Management Workshop.
[13] Joe Kilian,et al. A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.
[14] R. L. Fountain,et al. The fingerprinted database , 1990, [1990] Proceedings. Sixth International Conference on Data Engineering.
[15] Min Wu,et al. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.
[16] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[17] Min Wu,et al. PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING , 2004 .
[18] Jessica Staddon,et al. Applications of list decoding to tracing traitors , 2003, IEEE Trans. Inf. Theory.
[19] Catherine A. Meadows,et al. Fingerprinting Long Forgiving Messages , 1985, CRYPTO.
[20] Min Wu,et al. Improving collusion resistance of error correcting code based multimedia fingerprinting , 2005, Proceedings. (ICASSP '05). IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005..
[21] Jessica Staddon,et al. Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.
[22] Min Wu,et al. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.
[23] Hua Wang,et al. A secure multicast protocol with copyright protection , 2002, CCRV.
[24] Min Wu,et al. Data hiding in binary image for authentication and annotation , 2004, IEEE Transactions on Multimedia.
[25] Min Wu,et al. Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..
[26] Min Wu,et al. Data hiding in image and video .I. Fundamental issues and solutions , 2003, IEEE Trans. Image Process..
[27] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..