-
1
-
-
34248369755
-
-
N. P. Anthapadmanabhan, A. Barg, and I. Dumer, Fingerprinting Capacity Under the Marking Assumption, 2006 [Online]. Available: http://arxiv.org/ PS_cache/cs/pdf/0612/0612073.pdf, preprint
-
N. P. Anthapadmanabhan, A. Barg, and I. Dumer, Fingerprinting Capacity Under the Marking Assumption, 2006 [Online]. Available: http://arxiv.org/ PS_cache/cs/pdf/0612/0612073.pdf, preprint
-
-
-
-
2
-
-
0034872180
-
Good digital finger-printing codes
-
Washington, DC, Jun
-
A. Barg, G. R. Blakley, and G. Kabatiansky, "Good digital finger-printing codes," in Proc. IEEE Int. Symp. Information Theory Washington, DC, Jun. 2001, p. 161.
-
(2001)
Proc. IEEE Int. Symp. Information Theory
, pp. 161
-
-
Barg, A.1
Blakley, G.R.2
Kabatiansky, G.3
-
3
-
-
0037399342
-
Digital fingerprinting codes: Problem statements, constructions, identification of traitors
-
Apr
-
A. Barg, G. R. Blakley, and G. Kabatiansky, "Digital fingerprinting codes: Problem statements, constructions, identification of traitors," IEEE Trans. Inf. Theory, vol. 49, no. 4, pp. 852-865, Apr. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.4
, pp. 852-865
-
-
Barg, A.1
Blakley, G.R.2
Kabatiansky, G.3
-
4
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
Sep
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, Sep. 1998.
-
(1998)
IEEE Trans. Inf. Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
5
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
May
-
B. Chen and G. W. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.W.2
-
6
-
-
0034188648
-
Tracing traitors
-
May
-
B. Chor, A. Fiat, M. Naor, and B. Pinkas, "Tracing traitors," IEEE Trans. Inf. Theory, vol. 46, no. 3, pp. 893-910, May 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.3
, pp. 893-910
-
-
Chor, B.1
Fiat, A.2
Naor, M.3
Pinkas, B.4
-
7
-
-
0007370350
-
Copyright protection for digital data
-
May
-
G. Cohen, S. Encheva, and G. Zémor, "Copyright protection for digital data," IEEE Commun. Lett., vol. 4, no. 5, pp. 158-160, May 2000.
-
(2000)
IEEE Commun. Lett
, vol.4
, Issue.5
, pp. 158-160
-
-
Cohen, G.1
Encheva, S.2
Zémor, G.3
-
8
-
-
0036612282
-
The Gaussian watermarking game
-
Jun
-
A. Cohen and A. Lapidoth, "The Gaussian watermarking game," IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1639-1667, Jun. 2002.
-
(2002)
IEEE Trans. Inf. Theory
, vol.48
, Issue.6
, pp. 1639-1667
-
-
Cohen, A.1
Lapidoth, A.2
-
9
-
-
0034844812
-
The capacity of the vector Gaussian watermarking game
-
Washington, DC, Jun
-
A. Cohen and A. Lapidoth, "The capacity of the vector Gaussian watermarking game," in Proc. IEEE Int. Symp. Information Theory, Washington, DC, Jun. 2001, p. 5.
-
(2001)
Proc. IEEE Int. Symp. Information Theory
, pp. 5
-
-
Cohen, A.1
Lapidoth, A.2
-
10
-
-
2942685503
-
Upper bounds on separating codes
-
Jun
-
G. D. Cohen and H. G. Schaathun, "Upper bounds on separating codes," IEEE Trans. Inf. Theory, vol. 50, no. 6, pp. 1291-1294, Jun. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.6
, pp. 1291-1294
-
-
Cohen, G.D.1
Schaathun, H.G.2
-
11
-
-
0015565580
-
Enumerative source coding
-
Jan
-
T. M. Cover, "Enumerative source coding," IEEE Trans. Inf. Theory vol. IT-19, no. 1, pp. 73-77, Jan. 1973.
-
(1973)
IEEE Trans. Inf. Theory
, vol.IT-19
, Issue.1
, pp. 73-77
-
-
Cover, T.M.1
-
13
-
-
0000676728
-
Combining digital watermarks and collusion secure fingerprints for digital images
-
Oct
-
J. Dittmann, A. Behr, M. Stabenau, P. Schmitt, J. Schwenk, and J. Ueberberg, "Combining digital watermarks and collusion secure fingerprints for digital images," J. Electron. Imag., vol. 9, no. 4, pp. 456-467, Oct. 2000.
-
(2000)
J. Electron. Imag
, vol.9
, Issue.4
, pp. 456-467
-
-
Dittmann, J.1
Behr, A.2
Stabenau, M.3
Schmitt, P.4
Schwenk, J.5
Ueberberg, J.6
-
14
-
-
85047690191
-
The random coding bound is tight for the average code
-
Mar
-
R. G. Gallager, "The random coding bound is tight for the average code," IEEE Trans. Inf. Theory, vol. IT-19, no. 2, pp. 244-246, Mar. 1973.
-
(1973)
IEEE Trans. Inf. Theory
, vol.IT-19
, Issue.2
, pp. 244-246
-
-
Gallager, R.G.1
-
15
-
-
0042265652
-
A relationship between quantization and watermarking rates in the presence of additive Gaussian attacks information theory
-
Aug
-
D. Karakos and A. Papamarcou, "A relationship between quantization and watermarking rates in the presence of additive Gaussian attacks information theory," IEEE Trans. Inf. Theory, vol. 49, no. 8, pp. 1970-1982, Aug. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.8
, pp. 1970-1982
-
-
Karakos, D.1
Papamarcou, A.2
-
16
-
-
0036648211
-
A class of traceability codes
-
Jul
-
T. Lindkvist, J. Lofvenberg, and M. Svanstrom, "A class of traceability codes," IEEE Trans. Inf. Theory, vol. 48, no. 7, pp. 2094-2096, Jul. 2002.
-
(2002)
IEEE Trans. Inf. Theory
, vol.48
, Issue.7
, pp. 2094-2096
-
-
Lindkvist, T.1
Lofvenberg, J.2
Svanstrom, M.3
-
17
-
-
0030105189
-
A new universal random coding bound for the multiple access channel
-
Mar
-
Y. S. Liu and B. L. Hughes, "A new universal random coding bound for the multiple access channel," IEEE Trans. Inf. Theory, vol. 42, no. 2, pp. 376-386, Mar. 1996.
-
(1996)
IEEE Trans. Inf. Theory
, vol.42
, Issue.2
, pp. 376-386
-
-
Liu, Y.S.1
Hughes, B.L.2
-
18
-
-
15044347861
-
Codes for Digital Fingerprints,
-
Ph.D. dissertation, Dept. Elec. Eng, Linköping Univ, Linköping, Sweden, Jun
-
J. Löfvenberg, "Codes for Digital Fingerprints," Ph.D. dissertation, Dept. Elec. Eng., Linköping Univ., Linköping, Sweden, Jun. 2001.
-
(2001)
-
-
Löfvenberg, J.1
-
19
-
-
34248324803
-
Random codes for Digital Finger-printing Dept. Elec. Eng., Linköping Univ., Linköping, Sweden, Rep. Reg nr:LITH-ISY-R-2059
-
Jun
-
J. Löfvenberg and N. Wilberg, Random codes for Digital Finger-printing Dept. Elec. Eng., Linköping Univ., Linköping, Sweden, Rep. Reg nr:LITH-ISY-R-2059, Jun. 2001.
-
(2001)
-
-
Löfvenberg, J.1
Wilberg, N.2
-
20
-
-
0033871878
-
On random coding error exponents of watermarking systems
-
Mar
-
N. Merhav, "On random coding error exponents of watermarking systems," IEEE Trans. Inf Theory, vol. 46, no. 2, pp. 420-430, Mar. 2000.
-
(2000)
IEEE Trans. Inf Theory
, vol.46
, Issue.2
, pp. 420-430
-
-
Merhav, N.1
-
22
-
-
1442313262
-
The parallel-Gaussian watermarking game
-
Feb
-
P. Moulin and M. K. Mihcak, "The parallel-Gaussian watermarking game," IEEE Trans. Inf. Theory, vol. 50, no. 2, pp. 272-289, Feb. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.2
, pp. 272-289
-
-
Moulin, P.1
Mihcak, M.K.2
-
23
-
-
0034449758
-
Information-theoretic analysis of information hiding
-
Sorrento, Italy, Jun
-
P. Moulin and J. A. O'Sullivan, "Information-theoretic analysis of information hiding," in Proc. IEEE Int. Symp. Information Theory, Sorrento, Italy, Jun. 2000, p. 19.
-
(2000)
Proc. IEEE Int. Symp. Information Theory
, pp. 19
-
-
Moulin, P.1
O'Sullivan, J.A.2
-
24
-
-
0037353686
-
Information-theoretic analysis of information hiding
-
Mar
-
P. Moulin and J. A. O'Sullivan, "Information-theoretic analysis of information hiding," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 563-593, Mar. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.3
, pp. 563-593
-
-
Moulin, P.1
O'Sullivan, J.A.2
-
25
-
-
84890380431
-
Information-theoretic analysis of steganography
-
Cambridge, MA, Aug
-
J. A. O'Sullivan, P. Moulin, and J. M. Ettinger, "Information-theoretic analysis of steganography," in Proc. IEEE Int. Symp. Information Theory, Cambridge, MA, Aug. 1998, p. 297.
-
(1998)
Proc. IEEE Int. Symp. Information Theory
, pp. 297
-
-
O'Sullivan, J.A.1
Moulin, P.2
Ettinger, J.M.3
-
26
-
-
0037516820
-
-
S. S. Pradhan, J. Chou, and K. Ramchandran, Duality between source coding and channel coding and its extension to the side information case, IEEE Trans. Inf. Theory, 49, no. 5, pp. 1181-1203, May 2003.
-
S. S. Pradhan, J. Chou, and K. Ramchandran, "Duality between source coding and channel coding and its extension to the side information case," IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1181-1203, May 2003.
-
-
-
-
27
-
-
84959043688
-
Collusion secure q-ary fingerprinting for perceptual content
-
Digital Rights ManagementWorkshop , T. Sander, Ed. Berlin, Germany: Springer-Verlag
-
R. Safavi-Naini and Y. Wang, "Collusion secure q-ary fingerprinting for perceptual content," in Digital Rights ManagementWorkshop (Lecture Notes in Computer Science), T. Sander, Ed. Berlin, Germany: Springer-Verlag, 2002, vol. 2320, pp. 57-75.
-
(2002)
Lecture Notes in Computer Science
, vol.2320
, pp. 57-75
-
-
Safavi-Naini, R.1
Wang, Y.2
-
28
-
-
0038192132
-
Sequential traitor tracing
-
May
-
R. Safavi-Naini and Y.Wang, "Sequential traitor tracing," IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1319-1326, May 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.5
, pp. 1319-1326
-
-
Safavi-Naini, R.1
Wang, Y.2
-
29
-
-
5044248629
-
Communication over an Unknown Channel Via Common Broadcasting,
-
Ph.D. dissertation, Tel-Aviv Univ, Tel-Aviv, Israel
-
N. Shulman, "Communication over an Unknown Channel Via Common Broadcasting," Ph.D. dissertation, Tel-Aviv Univ., Tel-Aviv, Israel, 2003.
-
(2003)
-
-
Shulman, N.1
-
30
-
-
0038530774
-
Application of list decoding to tracing traitors
-
May
-
A. Silverberg, J. Staddon, and J. L. Walker, "Application of list decoding to tracing traitors," IEEE Trans. Inf. Theory, vol. 49, no. 5, pp. 1312-1318, May 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.5
, pp. 1312-1318
-
-
Silverberg, A.1
Staddon, J.2
Walker, J.L.3
-
31
-
-
0037353685
-
On the error exponent and capacity games of private watermarking systems
-
Mar
-
A. Somekh-Baruch and N. Merhav, "On the error exponent and capacity games of private watermarking systems," IEEE Trans. Inf. Theory, vol. 49, no. 3, pp. 537-562, Mar. 2003.
-
(2003)
IEEE Trans. Inf. Theory
, vol.49
, Issue.3
, pp. 537-562
-
-
Somekh-Baruch, A.1
Merhav, N.2
-
32
-
-
1842481655
-
On the capacity game of public watermarking systems
-
Mar
-
A. Somekh-Baruch and N. Merhav, "On the capacity game of public watermarking systems," IEEE Trans. Inf. Theory, vol. 50, no. 3, pp. 511-524, Mar. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.50
, Issue.3
, pp. 511-524
-
-
Somekh-Baruch, A.1
Merhav, N.2
-
33
-
-
15044340426
-
On the capacity game of private fingerprinting systems under collusion attacks
-
Mar
-
A. Somekh-Baruch and N. Merhav, "On the capacity game of private fingerprinting systems under collusion attacks," IEEE Trans. Inf. Theory, vol. 51, no. 3, pp. 884-899, Mar. 2005.
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.3
, pp. 884-899
-
-
Somekh-Baruch, A.1
Merhav, N.2
-
34
-
-
0035334148
-
Identification in the presence of side information with application to watermarking
-
May
-
Y. Steinberg and N. Merhav, "Identification in the presence of side information with application to watermarking," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1410-1422, May 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.4
, pp. 1410-1422
-
-
Steinberg, Y.1
Merhav, N.2
-
35
-
-
84937053497
-
Capacity of digital watermarks subjected to an optimal collusion attack
-
Tampere, Finland, Sep
-
J. K. Su, J. J. Eggers, and B. Girod, "Capacity of digital watermarks subjected to an optimal collusion attack," in Proc. European Signal Processing Conference (EUSIPCO 2000), Tampere, Finland, Sep. 2000.
-
(2000)
Proc. European Signal Processing Conference (EUSIPCO 2000)
-
-
Su, J.K.1
Eggers, J.J.2
Girod, B.3
-
36
-
-
0036031232
-
A novel approach to collusion resistant video watermarking
-
K. Su, D. Kundur, and D. Hatzinakos, "A novel approach to collusion resistant video watermarking," Proc. SPIE-Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 491-502, 2002.
-
(2002)
Proc. SPIE-Security and Watermarking of Multimedia Contents IV
, vol.4675
, pp. 491-502
-
-
Su, K.1
Kundur, D.2
Hatzinakos, D.3
-
37
-
-
39049134843
-
Capacity and random-coding error exponent for public fingerprinting game
-
Seattle, WA, Jul
-
Y. Wang and P. Moulin, "Capacity and random-coding error exponent for public fingerprinting game," in Proc. IEEE Int. Symp. Information Theory, Seattle, WA, Jul. 2007, pp. 1174-1178.
-
(2007)
Proc. IEEE Int. Symp. Information Theory
, pp. 1174-1178
-
-
Wang, Y.1
Moulin, P.2
-
38
-
-
0036847453
-
Asymptotic bounds on frameproof codes
-
Nov
-
C. Xing, "Asymptotic bounds on frameproof codes," IEEE Trans. Inf. Theory, vol. 48, no. 11, pp. 2991-2995, Nov. 2004.
-
(2004)
IEEE Trans. Inf. Theory
, vol.48
, Issue.11
, pp. 2991-2995
-
-
Xing, C.1
|