Traitor tracing over YouTube video service—proof of concept
暂无分享,去创建一个
Miguel Soriano | Joan Tomàs-Buliart | Marcel Fernandez | Marcel Fernández | M. Soriano | Joan Tomàs-Buliart
[1] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[2] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[3] Taekyung Kim,et al. Fast informed embedding in dirty-paper trellis-code with orthogonal arcs , 2006, MCPS '06.
[4] Min Wu,et al. Collusion-Resistant Video Fingerprinting for Large User Group , 2006, IEEE Transactions on Information Forensics and Security.
[5] Sergey Ioffe,et al. Permutation grouping: intelligent Hash function design for audio & image retrieval , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.
[6] Ingemar J. Cox,et al. Dirty-paper trellis codes for watermarking , 2002, Proceedings. International Conference on Image Processing.
[7] Juan Hernández-Serrano,et al. Multimedia Copyright Protection Platform Demonstrator , 2005, iTrust.
[8] Shumeet Baluja,et al. Audio Fingerprinting: Combining Computer Vision & Data Stream Processing , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[9] Ingemar J. Cox,et al. Applying informed coding and embedding to design a robust high-capacity watermark , 2004, IEEE Transactions on Image Processing.
[10] Max H. M. Costa,et al. Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.
[11] Alexander Barg,et al. Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.
[12] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[13] Ingemar J. Cox,et al. Informed Embedding for Multi-bit Watermarks , 2002, IWDW.
[14] Shumeet Baluja,et al. Known-Audio Detection using Waveprint: Spectrogram Fingerprinting by Wavelet Hashing , 2007, 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07.
[15] Joan Tomàs-Buliart,et al. Using Informed Coding and Informed Embedding to Design Robust Fingerprinting Embedding Systems , 2007, KES.
[16] Pierre Moulin,et al. Data-Hiding Codes , 2005, Proceedings of the IEEE.
[17] Miguel Soriano,et al. Fingerprinting Concatenated Codes with Efficient Identification , 2002, ISC.
[18] Sergey Yekhanin,et al. Towards 3-query locally decodable codes of subexponential length , 2008, JACM.
[19] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data (Extended Abstract) , 1995, CRYPTO.
[20] Min Wu,et al. Joint coding and embedding techniques for MultimediaFingerprinting , 2006, IEEE Transactions on Information Forensics and Security.
[21] Josep Domingo-Ferrer,et al. Simple collusion-secure fingerprinting schemes for images , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).