메뉴 건너뛰기




Volumn II, Issue , 2005, Pages

Linear combination collusion attack and its application on an anti-collusion fingerprinting

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER APPLICATIONS; IMAGE QUALITY; MULTIMEDIA SYSTEMS; PATTERN RECOGNITION; SIGNAL PROCESSING;

EID: 33646766143     PISSN: 15206149     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICASSP.2005.1415329     Document Type: Conference Paper
Times cited : (30)

References (20)
  • 1
    • 84957085257 scopus 로고    scopus 로고
    • An efficient public key traitor tracing scheme
    • Crypto99
    • D. Boneh and M. Franklin, "An efficient public key traitor tracing scheme," Crypto99, Lecture Notes in Computer Science (LNCS) 1666, pp 338-353, 1999.
    • (1999) Lecture Notes in Computer Science (LNCS) , vol.1666 , pp. 338-353
    • Boneh, D.1    Franklin, M.2
  • 2
    • 84957670625 scopus 로고
    • Collusion-secure fingerprinting for digital data
    • CRYPTO'95
    • D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," CRYPTO'95, LNCS 963, pp.452-465, 1995.
    • (1995) LNCS , vol.963 , pp. 452-465
    • Boneh, D.1    Shaw, J.2
  • 3
    • 84985922619 scopus 로고
    • Tracing traitors
    • Crypto94
    • B. Chor,A. Fiat and M. Naor, "Tracing traitors," Crypto94, LNCS 839, pp. 257-270, 1994.
    • (1994) LNCS , vol.839 , pp. 257-270
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 4
    • 84957617696 scopus 로고    scopus 로고
    • Threshold traitor tracing
    • Crypto98
    • M. Naor and B. Pinkas, "Threshold traitor tracing," Crypto98, LNCS 1462,pp. 502-517, 1998.
    • (1998) LNCS , vol.1462 , pp. 502-517
    • Naor, M.1    Pinkas, B.2
  • 6
    • 35248899841 scopus 로고    scopus 로고
    • Public key trace and revoke scheme secure against adaptive chosen ciphertext attack
    • Y. Dodis and N. Fazio, "Public key trace and revoke scheme secure against adaptive chosen ciphertext attack," Publick key conference 2003, pp.100-115, 2003.
    • (2003) Publick Key Conference 2003 , pp. 100-115
    • Dodis, Y.1    Fazio, N.2
  • 7
    • 0002016098 scopus 로고    scopus 로고
    • Combinatorial properties and constructions of traceability schemes and frameproof codes
    • D. R. Stinson and R. Wei, "Combinatorial properties and constructions of traceability schemes and frameproof codes," SIAM J. on Discrete Math, 11(1):41- 53,1998.
    • (1998) SIAM J. on Discrete Math , vol.11 , Issue.1 , pp. 41-53
    • Stinson, D.R.1    Wei, R.2
  • 9
    • 84957610906 scopus 로고    scopus 로고
    • A note on the limits of collusion-resistant watermarks
    • Advances in Cryptology - EURO-CRYPT'99
    • Funda Ergun, Joe Kilian and Ravi Kumar, "A note on the limits of collusion-resistant watermarks," Advances in Cryptology - EURO-CRYPT'99, LNCS 1592, pp. 140-149, 1999.
    • (1999) LNCS , vol.1592 , pp. 140-149
    • Ergun, F.1    Kilian, J.2    Kumar, R.3
  • 11
    • 0141856343 scopus 로고    scopus 로고
    • Resistance of orthogonal Gaussian fingerprints to collusion attacks
    • Z. Jane Wang, Min Wu, Hong Zhao, K. J. Ray Liu and Wade Trappe, "Resistance of orthogonal Gaussian fingerprints to collusion attacks," ICASSP (2003) IV724-727.
    • (2003) ICASSP
    • Wang, Z.J.1    Wu, M.2    Zhao, H.3    Liu, K.J.R.4    Trappe, W.5
  • 14
    • 0141855111 scopus 로고    scopus 로고
    • Nonlinear collusion attacks on independent fingerprints for multimedia
    • Hong Zhao, Min Wu, Z. Jane Wang and K. J. Ray Liu, "Nonlinear Collusion Attacks on Independent Fingerprints For Multimedia," ICASSP (2003), V664-667 1.
    • ICASSP (2003)
    • Zhao, H.1    Wu, M.2    Wang, Z.J.3    Liu, K.J.R.4
  • 19
    • 13144275283 scopus 로고    scopus 로고
    • Statistical invisibility for collusion-resistant digital video watermarking
    • Karen Su, Deepa Kundur, and Dimitrios Hatzinakos, "Statistical Invisibility for Collusion-resistant Digital Video Watermarking," IEEE Transactions on Multimedia, http://www.srcf.ucam.org/~ks349/research.php3
    • IEEE Transactions on Multimedia
    • Su, K.1    Kundur, D.2    Hatzinakos, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.