메뉴 건너뛰기




Volumn 4283 LNCS, Issue , 2006, Pages 308-322

Desynchronization in compression process for collusion resilient video fingerprint

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; IMAGE QUALITY; PATTERN RECOGNITION; SECURITY OF DATA; SYNCHRONIZATION;

EID: 33845439916     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11922841_25     Document Type: Conference Paper
Times cited : (9)

References (18)
  • 2
    • 33749234200 scopus 로고    scopus 로고
    • Resistance analysis of scalable video fingerprinting systems under fair collusion attacks
    • Geneva, Italy
    • Zhao, H.V., and Liu, K.J.R.: Resistance analysis of scalable video fingerprinting systems under fair collusion attacks. IEEE ICIP 2005, III. 85-88, Geneva, Italy.
    • IEEE ICIP 2005 , vol.3 , pp. 85-88
    • Zhao, H.V.1    Liu, K.J.R.2
  • 3
    • 33646766143 scopus 로고    scopus 로고
    • Linear combination collusion attack and its application on an anti-collusion fingerprinting
    • Philadelphia, USA
    • Wu, Y.D.: Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting. IEEE ICASSP 2005, II. 13-16, Philadelphia, USA.
    • IEEE ICASSP 2005 , vol.2 , pp. 13-16
    • Wu, Y.D.1
  • 6
    • 4744372232 scopus 로고    scopus 로고
    • Collusion-resilient fingerprinting by random pre-warping
    • Celik, M.U., Sharma, G., and Tekalp, A.M.: Collusion-Resilient Fingerprinting by Random Pre-Warping. IEEE Signal Processing Letters 11(10) (2004) 831-835.
    • (2004) IEEE Signal Processing Letters , vol.11 , Issue.10 , pp. 831-835
    • Celik, M.U.1    Sharma, G.2    Tekalp, A.M.3
  • 7
    • 33749625961 scopus 로고    scopus 로고
    • Collusion-resistant intentional de-synchronization for digital video fingerprinting
    • Genova, Italy
    • Mao, Y.N., and Mihcak, K.: Collusion-Resistant Intentional De-Synchronization for Digital Video Fingerprinting. IEEE ICIP 2005, I. 237-240, Genova, Italy.
    • IEEE ICIP 2005 , vol.1 , pp. 237-240
    • Mao, Y.N.1    Mihcak, K.2
  • 11
    • 0038421817 scopus 로고    scopus 로고
    • Performance and complexity joint optimization for H.264 video coding
    • Bangkok, Thailand
    • Zhang, J.N., He, Y.W., Yang, S.Q., and Zhong, Y.Z.: Performance and complexity joint optimization for H.264 video coding. IEEE ISCAS 2003, II. 888-891, Bangkok, Thailand.
    • IEEE ISCAS 2003 , vol.2 , pp. 888-891
    • Zhang, J.N.1    He, Y.W.2    Yang, S.Q.3    Zhong, Y.Z.4
  • 12
    • 85089792009 scopus 로고    scopus 로고
    • Position prediction motion-compensated interpolation for frame rate up-conversion using temporal modeling
    • Geneva, Italy
    • Zhang, J.N., Sun, L.F., Yang, S.Q., and Zhong, Y.Z.: Position Prediction Motion-Compensated Interpolation for Frame Rate Up-Conversion Using Temporal Modeling. IEEE ICIP 2005, I. 53-56, Geneva, Italy.
    • IEEE ICIP 2005 , vol.1 , pp. 53-56
    • Zhang, J.N.1    Sun, L.F.2    Yang, S.Q.3    Zhong, Y.Z.4
  • 13
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Boneh, D., and Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Information Theory 44 (5) (1998) 1897-1905.
    • (1998) IEEE Trans. Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 14
    • 4744374963 scopus 로고    scopus 로고
    • Temporal synchronization in video watermarking
    • Lin, E.T., and Delp, E.J.: Temporal Synchronization in Video Watermarking. IEEE Trans. Signal Processing 52 (10) (2004) 3007-3022.
    • (2004) IEEE Trans. Signal Processing , vol.52 , Issue.10 , pp. 3007-3022
    • Lin, E.T.1    Delp, E.J.2
  • 15
    • 23944489852 scopus 로고    scopus 로고
    • Watermarking attack: Security of WSS techniques
    • Seoul, Korea
    • Cayre, F., Fontaine, C., and Furon, T.: Watermarking Attack: Security of WSS Techniques. IWDW 2004, 171-183, Seoul, Korea.
    • IWDW 2004 , pp. 171-183
    • Cayre, F.1    Fontaine, C.2    Furon, T.3
  • 16
    • 24144455642 scopus 로고    scopus 로고
    • Geometric attacks on image watermarking systems
    • Licks, V., and Jordan, R.: Geometric Attacks on Image Watermarking Systems. IEEE Multimedia 12 (3) (2005) 68-78.
    • (2005) IEEE Multimedia , vol.12 , Issue.3 , pp. 68-78
    • Licks, V.1    Jordan, R.2
  • 18
    • 33845458586 scopus 로고    scopus 로고
    • Coping with random bending attack by means of exhaustive search detection
    • Barcelona, Spain, June
    • Barni, M.: Coping with Random Bending Attack by Means of Exhaustive Search Detection. In First Wavila Challenge, WACHA 2005, Barcelona, Spain, June 2005.
    • (2005) First Wavila Challenge, WACHA 2005
    • Barni, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.