메뉴 건너뛰기




Volumn 1, Issue 2, 2006, Pages 231-247

Joint coding and embedding techniques for multimedia fingerprinting

Author keywords

Collusion resistance; Error correcting code; Group based fingerprinting; Joint coding and embedding; Multimedia fingerprinting; Traitor tracing

Indexed keywords

COLLUSION RESISTANCE; ERROR CORRECTING CODE; GROUP-BASED FINGERPRINTING; JOINT CODING AND EMBEDDING;

EID: 33744722091     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2006.873597     Document Type: Article
Times cited : (97)

References (27)
  • 1
    • 84957610906 scopus 로고    scopus 로고
    • A note on the limits of collusion-resistant watermark
    • Jan.
    • F. Ergun, J. Kilian, and R. Kumar, "A note on the limits of collusion-resistant watermark," Lecture Notes Comput. Sci., vol. 1592, Jan. 1999.
    • (1999) Lecture Notes Comput. Sci. , vol.1592
    • Ergun, F.1    Kilian, J.2    Kumar, R.3
  • 2
    • 20444373301 scopus 로고    scopus 로고
    • Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation
    • Jun.
    • Z. J. Wang, M. Wu, H. Zhao, W. Trappe, and K. J. R. Liu, "Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation," IEEE Trans. Image. Process., vol. 14, no. 6, pp. 804-821, Jun. 2005.
    • (2005) IEEE Trans. Image. Process. , vol.14 , Issue.6 , pp. 804-821
    • Wang, Z.J.1    Wu, M.2    Zhao, H.3    Trappe, W.4    Liu, K.J.R.5
  • 4
    • 0031362116 scopus 로고    scopus 로고
    • Secure spread spectrum watermarking for multimedia
    • Dec.
    • I. Cox, J. Kilian, F. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
    • (1997) IEEE Trans. Image Process. , vol.6 , Issue.12 , pp. 1673-1687
    • Cox, I.1    Kilian, J.2    Leighton, F.3    Shamoon, T.4
  • 7
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Sep.
    • D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, Sep. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 8
    • 84937541590 scopus 로고    scopus 로고
    • Improved Boneh-Shaw content fingerprinting
    • CT-RSA 2001
    • Y. Yacobi, "Improved Boneh-Shaw content fingerprinting," Lecture Notes Comput. Sci. vol. 2020, CT-RSA 2001, 2001, pp. 378-391.
    • (2001) Lecture Notes Comput. Sci. , vol.2020 , pp. 378-391
    • Yacobi, Y.1
  • 9
    • 0038527384 scopus 로고    scopus 로고
    • Anti-collusion fingerprinting for multimedia
    • Apr.
    • W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu, "Anti-collusion fingerprinting for multimedia," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1069-1087, Apr. 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.4 , pp. 1069-1087
    • Trappe, W.1    Wu, M.2    Wang, Z.J.3    Liu, K.J.R.4
  • 11
    • 0037399342 scopus 로고    scopus 로고
    • Digital fingerprinting codes: Problem statements, constructions, identification of traitors
    • Apr.
    • A. Barg, G. R. Blakley, and G. Kabatiansky, "Digital fingerprinting codes: problem statements, constructions, identification of traitors," IEEE Trans. Inform. Theory, vol. 49, no. 4, pp. 852-865, Apr. 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , Issue.4 , pp. 852-865
    • Barg, A.1    Blakley, G.R.2    Kabatiansky, G.3
  • 13
    • 35248837412 scopus 로고    scopus 로고
    • Traitor tracing for shortened and corrupted fingerprints
    • Jan.
    • R. Safavi-Naini and Y. Wang, "Traitor tracing for shortened and corrupted fingerprints," Lecture Notes Comput. Sci., vol. 2696, Jan. 2003.
    • (2003) Lecture Notes Comput. Sci. , vol.2696
    • Safavi-Naini, R.1    Wang, Y.2
  • 14
    • 3042578687 scopus 로고    scopus 로고
    • Soft-decision tracing in fingerprinted multimedia content
    • Apr. -Jun.
    • M. Fernandez and M. Soriano, "Soft-decision tracing in fingerprinted multimedia content," IEEE Multimedia, vol. 11, no. 2, pp. 38-46, Apr. -Jun. 2004.
    • (2004) IEEE Multimedia , vol.11 , Issue.2 , pp. 38-46
    • Fernandez, M.1    Soriano, M.2
  • 15
    • 85032751604 scopus 로고    scopus 로고
    • Collusion resistant fingerprinting for multimedia
    • Mar.
    • M. Wu, W. Trappe, Z. Wang, and K. J. R. Liu, "Collusion resistant fingerprinting for multimedia," IEEE Signal Process. Mag., vol. 21, no. 2, pp. 15-27, Mar. 2004.
    • (2004) IEEE Signal Process. Mag. , vol.21 , Issue.2 , pp. 15-27
    • Wu, M.1    Trappe, W.2    Wang, Z.3    Liu, K.J.R.4
  • 16
    • 0038156437 scopus 로고    scopus 로고
    • Data hiding in image and video: Part-I - Fundamental issues and solutions
    • Jun.
    • M. Wu and B. Liu, "Data hiding in image and video: part-I - fundamental issues and solutions," IEEE Trans. Image Process., vol. 12, no. 6, pp. 685-695, Jun. 2003.
    • (2003) IEEE Trans. Image Process. , vol.12 , Issue.6 , pp. 685-695
    • Wu, M.1    Liu, B.2
  • 17
    • 0035270516 scopus 로고    scopus 로고
    • Combinatorial properties of frameproof and traceability codes
    • Mar.
    • J. N. Staddon, D. R. Stinson, and R. Wei, "Combinatorial properties of frameproof and traceability codes," IEEE Trans. Inf. Theory, vol. 47, no. 3, pp. 1042-1049, Mar. 2001.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.3 , pp. 1042-1049
    • Staddon, J.N.1    Stinson, D.R.2    Wei, R.3
  • 18
    • 18844450187 scopus 로고    scopus 로고
    • Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
    • May
    • H. V. Zhao, M. Wu, Z. J. Wang, and K. J. R. Liu, "Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting," IEEE Trans. Image Process., vol. 14, no. 5, pp. 646-661, May 2005.
    • (2005) IEEE Trans. Image Process. , vol.14 , Issue.5 , pp. 646-661
    • Zhao, H.V.1    Wu, M.2    Wang, Z.J.3    Liu, K.J.R.4
  • 19
    • 21844449883 scopus 로고    scopus 로고
    • Performance study of ECC-based collusion-resistant multimedia fingerprinting
    • Princeton, NJ, Mar.
    • S. He and M. Wu, "Performance study of ECC-based collusion-resistant multimedia fingerprinting," in Proc. 38th CISS, Princeton, NJ, Mar. 2004, pp. 827-832.
    • (2004) Proc. 38th CISS , pp. 827-832
    • He, S.1    Wu, M.2
  • 21
    • 0038530774 scopus 로고    scopus 로고
    • Applications of list decoding to tracing traitors
    • May
    • A. Silverberg, J. Staddon, and J. L. Walker, "Applications of list decoding to tracing traitors," IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1312-1318, May 2003.
    • (2003) IEEE Trans. Inf. Theory , vol.49 , Issue.5 , pp. 1312-1318
    • Silverberg, A.1    Staddon, J.2    Walker, J.L.3
  • 22
    • 84944317710 scopus 로고    scopus 로고
    • Efficient watermark detection and collusion security
    • FC 2000
    • F. Zane, "Efficient watermark detection and collusion security," FC 2000, Lecture Notes Comput. Sci. 1962 pp. 21-32, 2001.
    • (2001) Lecture Notes Comput. Sci. , vol.1962 , pp. 21-32
    • Zane, F.1
  • 24
    • 33645654061 scopus 로고    scopus 로고
    • Improving collusion resistance of error correcting code based multimedia fingerprinting
    • Philadelphia, PA, Mar.
    • S. He and M. Wu, "Improving collusion resistance of error correcting code based multimedia fingerprinting," in Proc. ICASSP, Philadelphia, PA, Mar. 2005, pp. 1029-1032.
    • (2005) Proc. ICASSP , pp. 1029-1032
    • He, S.1    Wu, M.2
  • 25
    • 3242759877 scopus 로고    scopus 로고
    • Data hiding in binary image for authentication and annotation
    • Aug.
    • M. Wu and B. Liu, "Data hiding in binary image for authentication and annotation," IEEE Trans. Multimedia, vol. 6, no. 4, pp. 528-538, Aug. 2004.
    • (2004) IEEE Trans. Multimedia , vol.6 , Issue.4 , pp. 528-538
    • Wu, M.1    Liu, B.2
  • 26
    • 21844462580 scopus 로고    scopus 로고
    • Group-oriented joint coding and embedding technique for multimedia fingerprinting
    • San Jose, CA, Jan.
    • S. He and M. Wu, "Group-oriented joint coding and embedding technique for multimedia fingerprinting," in Proc. SPIE Conf. Security, Watermarking Stegonography, San Jose, CA, Jan. 2005, vol. 5681, pp. 96-105.
    • (2005) Proc. SPIE Conf. Security, Watermarking Stegonography , vol.5681 , pp. 96-105
    • He, S.1    Wu, M.2
  • 27
    • 1242329966 scopus 로고    scopus 로고
    • On a class of traceability codes
    • Feb.
    • T. van Trung and S. Martirosyan, "On a class of traceability codes," Designs, Codes Cryptogr., vol. 31, no. 2, Feb. 2004, pp. 125-132.
    • (2004) Designs, Codes Cryptogr. , vol.31 , Issue.2 , pp. 125-132
    • Van Trung, T.1    Martirosyan, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.