-
1
-
-
84957670625
-
Collusion-secure fingerprinting for digital data
-
Proc. Advances in Cryptology - CRYPTO '95, Berlin: Springer-Verlag
-
D. Boneh and J. Shaw. Collusion-Secure Fingerprinting for Digital Data. In Proc. Advances in Cryptology - CRYPTO '95, Lecture Notes in Computer Science 963, Berlin: Springer-Verlag (1995) 452-465
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 452-465
-
-
Boneh, D.1
Shaw, J.2
-
2
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I.J.Cox, J.Kilian, T. Shamoon, T. Leighton. Secure Spread Spectrum Watermarking for Multimedia, in IEEE Trans, on Image Processing. 6(12) (1997) 1673-1687
-
(1997)
IEEE Trans, on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Shamoon, T.3
Leighton, T.4
-
3
-
-
84957610906
-
A note on the limits of collusion-resistant watermarks
-
Eurocrypt '99, Berlin: Springer-Verlag
-
F. Ergun, J. Kilian, and R. Kumar, A note on the limits of collusion-resistant watermarks, in Eurocrypt '99, Lecture Notes in Computer Science 1592, Berlin: Springer-Verlag (1999) 140-149
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 140-149
-
-
Ergun, F.1
Kilian, J.2
Kumar, R.3
-
4
-
-
0010076234
-
Digital fingerprinting codes: Problem statements, constructions, identification of traitors
-
DIMACS2001-52
-
A.Barg, G.R. Blakly, and G. Kabatiansky. Digital Fingerprinting Codes: Problem Statements, Constructions, Identification of Traitors, Technical report, DIMACS2001-52, (2001)
-
(2001)
Technical Report
-
-
Barg, A.1
Blakly, G.R.2
Kabatiansky, G.3
-
5
-
-
77955708529
-
Efficient traitor tracing algorithms using list decoding
-
Proc. Advances Cryptology - ASIACRYPT '01, Berlin: Springer-Verlag
-
A. Silverberg, J. Staddon, and J. Walker, Efficient Traitor Tracing Algorithms Using List Decoding, in Proc. Advances Cryptology - ASIACRYPT '01, Lecture Notes in Computer Science 2248, Berlin: Springer-Verlag (2001) 175-192
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 175-192
-
-
Silverberg, A.1
Staddon, J.2
Walker, J.3
-
7
-
-
0037796443
-
Resistance of digital watermarks to collusive attacks
-
Princeton University, Computer Science Department, July
-
J. Kilian, F. T. Leighton, L. R. Matheson, T. G. Shamoon, R. E. Tarjan, and F. Zane. Resistance of Digital Watermarks to Collusive Attacks. Technical Report TR-585-98, Princeton University, Computer Science Department, July (1998). http://citeseer.ist.psu.edu/kilian98resistance.html
-
(1998)
Technical Report
, vol.TR-585-98
-
-
Kilian, J.1
Leighton, F.T.2
Matheson, L.R.3
Shamoon, T.G.4
Tarjan, R.E.5
Zane, F.6
-
8
-
-
23944492640
-
Performance analysis of spread spectrum CDMA watermarking and applied reasearch in multiwavelet domain
-
in print
-
Y. Zhu, Z.W. Sun, D.G. Feng and Y.T. Yang, Performance Analysis of Spread Spectrum CDMA Watermarking and Applied Reasearch in Multiwavelet Domain, Chinese Journal of Computers, (2005) (in print)
-
(2005)
Chinese Journal of Computers
-
-
Zhu, Y.1
Sun, Z.W.2
Feng, D.G.3
Yang, Y.T.4
-
9
-
-
0031272770
-
Adaptive viterbi decoding of convolutional codes over memoryless channels
-
F. Chan and D. Haccoun. Adaptive Viterbi Decoding of Convolutional Codes over Memoryless Channels. IEEE Transactions on Communications, 45(11) (1997) 1389-1400
-
(1997)
IEEE Transactions on Communications
, vol.45
, Issue.11
, pp. 1389-1400
-
-
Chan, F.1
Haccoun, D.2
-
10
-
-
0014869779
-
Convolutional codes I: Algebraic structure
-
Forney, G. D., Jr., Convolutional Codes I: Algebraic Structure, IEEE Trans. on Information Theory, IT-16(6), November (1970) 720-738
-
(1970)
IEEE Trans. on Information Theory
, vol.IT-16
, Issue.6 NOVEMBER
, pp. 720-738
-
-
Forney Jr., G.D.1
-
11
-
-
84904310265
-
Convolutional fingerprinting information codes for collusion security
-
San Diego, August (to appear)
-
Y. Zhu, D.G. Feng, Y.T. Yang. Convolutional Fingerprinting Information Codes for Collusion Security, in Proceedings of the SPIE conference on Mathematics of Data/Image Coding, Compression, and Encryption VIII with Applications, San Diego, August (2005) (to appear)
-
(2005)
Proceedings of the SPIE Conference on Mathematics of Data/image Coding, Compression, and Encryption VIII with Applications
-
-
Zhu, Y.1
Feng, D.G.2
Yang, Y.T.3
|