-
1
-
-
84957610906
-
A note on the limits of collusion-resistant watermark
-
Jan.
-
F. Ergun, J. Kilian, and R. Kumar, "A note on the limits of collusion-resistant watermark," Lecture Notes Comput. Sci., vol. 1592, Jan. 1999.
-
(1999)
Lecture Notes Comput. Sci.
, vol.1592
-
-
Ergun, F.1
Kilian, J.2
Kumar, R.3
-
2
-
-
20444373301
-
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation
-
Jun.
-
Z. J. Wang, M. Wu, H. Zhao, W. Trappe, and K. J. R. Liu, "Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation," IEEE Trans. Image. Process., vol. 14, no. 6, pp. 804-821, Jun. 2005.
-
(2005)
IEEE Trans. Image. Process.
, vol.14
, Issue.6
, pp. 804-821
-
-
Wang, Z.J.1
Wu, M.2
Zhao, H.3
Trappe, W.4
Liu, K.J.R.5
-
3
-
-
11844303521
-
Group-oriented fingerprinting for multimedia forensics
-
Oct.
-
Z. J. Wang, M. Wu, W. Trappe, and K. J. R. Liu, "Group-oriented fingerprinting for multimedia forensics," EURASIP J. Appl. Signal Process., Special Issue on Multimedia Security Rights Management, vol. 2004, no. 14, pp. 2153-2173, Oct. 2004.
-
(2004)
EURASIP J. Appl. Signal Process., Special Issue on Multimedia Security Rights Management
, vol.2004
, Issue.14
, pp. 2153-2173
-
-
Wang, Z.J.1
Wu, M.2
Trappe, W.3
Liu, K.J.R.4
-
4
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec.
-
I. Cox, J. Kilian, F. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
-
(1997)
IEEE Trans. Image Process.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, F.3
Shamoon, T.4
-
5
-
-
0020939201
-
Fingerprinting
-
Oakland, CA, Apr.
-
N. R. Wagner, "Fingerprinting," in Proc. Symp. Security Privacy, Oakland, CA, Apr. 1983, pp. 18-22.
-
(1983)
Proc. Symp. Security Privacy
, pp. 18-22
-
-
Wagner, N.R.1
-
6
-
-
84947942283
-
Fingerprinting long forgiving messages
-
Jan.
-
C. Meadows, G. R. Blakley, and G. B. Purdy, "Fingerprinting long forgiving messages," Lecture Notes Comput. Sci., vol. 218, Jan. 1986.
-
(1986)
Lecture Notes Comput. Sci.
, vol.218
-
-
Meadows, C.1
Blakley, G.R.2
Purdy, G.B.3
-
7
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
Sep.
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, Sep. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
8
-
-
84937541590
-
Improved Boneh-Shaw content fingerprinting
-
CT-RSA 2001
-
Y. Yacobi, "Improved Boneh-Shaw content fingerprinting," Lecture Notes Comput. Sci. vol. 2020, CT-RSA 2001, 2001, pp. 378-391.
-
(2001)
Lecture Notes Comput. Sci.
, vol.2020
, pp. 378-391
-
-
Yacobi, Y.1
-
9
-
-
0038527384
-
Anti-collusion fingerprinting for multimedia
-
Apr.
-
W. Trappe, M. Wu, Z. J. Wang, and K. J. R. Liu, "Anti-collusion fingerprinting for multimedia," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1069-1087, Apr. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.4
, pp. 1069-1087
-
-
Trappe, W.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
10
-
-
84974712391
-
A 2-secure code with efficient tracing algorithm
-
D. To, R. Safavi-Naini, and Y. Wang, "A 2-secure code with efficient tracing algorithm," Progress in Cryptology - INDOCRYPT'02 Lecture Notes Comput. Sci., vol. 2551, pp. 149-162, 2002.
-
(2002)
Progress in Cryptology - INDOCRYPT'02 Lecture Notes Comput. Sci.
, vol.2551
, pp. 149-162
-
-
To, D.1
Safavi-Naini, R.2
Wang, Y.3
-
11
-
-
0037399342
-
Digital fingerprinting codes: Problem statements, constructions, identification of traitors
-
Apr.
-
A. Barg, G. R. Blakley, and G. Kabatiansky, "Digital fingerprinting codes: problem statements, constructions, identification of traitors," IEEE Trans. Inform. Theory, vol. 49, no. 4, pp. 852-865, Apr. 2003.
-
(2003)
IEEE Trans. Inform. Theory
, vol.49
, Issue.4
, pp. 852-865
-
-
Barg, A.1
Blakley, G.R.2
Kabatiansky, G.3
-
13
-
-
35248837412
-
Traitor tracing for shortened and corrupted fingerprints
-
Jan.
-
R. Safavi-Naini and Y. Wang, "Traitor tracing for shortened and corrupted fingerprints," Lecture Notes Comput. Sci., vol. 2696, Jan. 2003.
-
(2003)
Lecture Notes Comput. Sci.
, vol.2696
-
-
Safavi-Naini, R.1
Wang, Y.2
-
14
-
-
3042578687
-
Soft-decision tracing in fingerprinted multimedia content
-
Apr. -Jun.
-
M. Fernandez and M. Soriano, "Soft-decision tracing in fingerprinted multimedia content," IEEE Multimedia, vol. 11, no. 2, pp. 38-46, Apr. -Jun. 2004.
-
(2004)
IEEE Multimedia
, vol.11
, Issue.2
, pp. 38-46
-
-
Fernandez, M.1
Soriano, M.2
-
15
-
-
85032751604
-
Collusion resistant fingerprinting for multimedia
-
Mar.
-
M. Wu, W. Trappe, Z. Wang, and K. J. R. Liu, "Collusion resistant fingerprinting for multimedia," IEEE Signal Process. Mag., vol. 21, no. 2, pp. 15-27, Mar. 2004.
-
(2004)
IEEE Signal Process. Mag.
, vol.21
, Issue.2
, pp. 15-27
-
-
Wu, M.1
Trappe, W.2
Wang, Z.3
Liu, K.J.R.4
-
16
-
-
0038156437
-
Data hiding in image and video: Part-I - Fundamental issues and solutions
-
Jun.
-
M. Wu and B. Liu, "Data hiding in image and video: part-I - fundamental issues and solutions," IEEE Trans. Image Process., vol. 12, no. 6, pp. 685-695, Jun. 2003.
-
(2003)
IEEE Trans. Image Process.
, vol.12
, Issue.6
, pp. 685-695
-
-
Wu, M.1
Liu, B.2
-
17
-
-
0035270516
-
Combinatorial properties of frameproof and traceability codes
-
Mar.
-
J. N. Staddon, D. R. Stinson, and R. Wei, "Combinatorial properties of frameproof and traceability codes," IEEE Trans. Inf. Theory, vol. 47, no. 3, pp. 1042-1049, Mar. 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.3
, pp. 1042-1049
-
-
Staddon, J.N.1
Stinson, D.R.2
Wei, R.3
-
18
-
-
18844450187
-
Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
-
May
-
H. V. Zhao, M. Wu, Z. J. Wang, and K. J. R. Liu, "Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting," IEEE Trans. Image Process., vol. 14, no. 5, pp. 646-661, May 2005.
-
(2005)
IEEE Trans. Image Process.
, vol.14
, Issue.5
, pp. 646-661
-
-
Zhao, H.V.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
19
-
-
21844449883
-
Performance study of ECC-based collusion-resistant multimedia fingerprinting
-
Princeton, NJ, Mar.
-
S. He and M. Wu, "Performance study of ECC-based collusion-resistant multimedia fingerprinting," in Proc. 38th CISS, Princeton, NJ, Mar. 2004, pp. 827-832.
-
(2004)
Proc. 38th CISS
, pp. 827-832
-
-
He, S.1
Wu, M.2
-
21
-
-
0038530774
-
Applications of list decoding to tracing traitors
-
May
-
A. Silverberg, J. Staddon, and J. L. Walker, "Applications of list decoding to tracing traitors," IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1312-1318, May 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.5
, pp. 1312-1318
-
-
Silverberg, A.1
Staddon, J.2
Walker, J.L.3
-
22
-
-
84944317710
-
Efficient watermark detection and collusion security
-
FC 2000
-
F. Zane, "Efficient watermark detection and collusion security," FC 2000, Lecture Notes Comput. Sci. 1962 pp. 21-32, 2001.
-
(2001)
Lecture Notes Comput. Sci.
, vol.1962
, pp. 21-32
-
-
Zane, F.1
-
23
-
-
4544310181
-
A secure multicast protocol with copyright protection
-
Apr.
-
H. Chu, L. Qiao, and K. Nahrstedt, "A secure multicast protocol with copyright protection," Proc. ACM SIGCOMM Computer Communications Rev., vol. 32, no. 2, Apr. 2002.
-
(2002)
Proc. ACM SIGCOMM Computer Communications Rev.
, vol.32
, Issue.2
-
-
Chu, H.1
Qiao, L.2
Nahrstedt, K.3
-
24
-
-
33645654061
-
Improving collusion resistance of error correcting code based multimedia fingerprinting
-
Philadelphia, PA, Mar.
-
S. He and M. Wu, "Improving collusion resistance of error correcting code based multimedia fingerprinting," in Proc. ICASSP, Philadelphia, PA, Mar. 2005, pp. 1029-1032.
-
(2005)
Proc. ICASSP
, pp. 1029-1032
-
-
He, S.1
Wu, M.2
-
25
-
-
3242759877
-
Data hiding in binary image for authentication and annotation
-
Aug.
-
M. Wu and B. Liu, "Data hiding in binary image for authentication and annotation," IEEE Trans. Multimedia, vol. 6, no. 4, pp. 528-538, Aug. 2004.
-
(2004)
IEEE Trans. Multimedia
, vol.6
, Issue.4
, pp. 528-538
-
-
Wu, M.1
Liu, B.2
-
26
-
-
21844462580
-
Group-oriented joint coding and embedding technique for multimedia fingerprinting
-
San Jose, CA, Jan.
-
S. He and M. Wu, "Group-oriented joint coding and embedding technique for multimedia fingerprinting," in Proc. SPIE Conf. Security, Watermarking Stegonography, San Jose, CA, Jan. 2005, vol. 5681, pp. 96-105.
-
(2005)
Proc. SPIE Conf. Security, Watermarking Stegonography
, vol.5681
, pp. 96-105
-
-
He, S.1
Wu, M.2
-
27
-
-
1242329966
-
On a class of traceability codes
-
Feb.
-
T. van Trung and S. Martirosyan, "On a class of traceability codes," Designs, Codes Cryptogr., vol. 31, no. 2, Feb. 2004, pp. 125-132.
-
(2004)
Designs, Codes Cryptogr.
, vol.31
, Issue.2
, pp. 125-132
-
-
Van Trung, T.1
Martirosyan, S.2
|