메뉴 건너뛰기




Volumn 2696, Issue , 2003, Pages 81-100

Traitor tracing for shortened and corrupted fingerprints

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COPYRIGHTS; REED-SOLOMON CODES;

EID: 35248837412     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-44993-5_6     Document Type: Article
Times cited : (19)

References (29)
  • 1
    • 84957670625 scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Advances in Cryptology - CRYPTO'95, Springer-Verlag, Berlin, Heidelberg, New York
    • D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. In Advances in Cryptology - CRYPTO'95, Lecture Notes in Computer Science, volume 963, pages 453-465. Springer-Verlag, Berlin, Heidelberg, New York, 1995.
    • (1995) Lecture Notes in Computer Science , vol.963 , pp. 453-465
    • Boneh, D.1    Shaw, J.2
  • 2
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, Vol. 44, No. 5:1897-1905, 1998.
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 3
    • 84985922619 scopus 로고
    • Tracing traitors
    • Advances in Cryptology - CRYPTO'94, Springer-Verlag, Berlin, Heidelberg, New York
    • B. Chor, A. Fiat, and M. Naor. Tracing traitors. In Advances in Cryptology - CRYPTO'94, Lecture Notes in Computer Science, volume 839, pages 257-270. Springer-Verlag, Berlin, Heidelberg, New York, 1994.
    • (1994) Lecture Notes in Computer Science , vol.839 , pp. 257-270
    • Chor, B.1    Fiat, A.2    Naor, M.3
  • 4
    • 0004026002 scopus 로고    scopus 로고
    • Mulimedia Information and Systems. Morgan Kaufman Publishers
    • I. Cox, M. Miller, and J. Bloom. Digital Watermarking. Mulimedia Information and Systems. Morgan Kaufman Publishers, 2002.
    • (2002) Digital Watermarking
    • Cox, I.1    Miller, M.2    Bloom, J.3
  • 5
    • 0033601694 scopus 로고    scopus 로고
    • Combining digital watermarks and collusion secure fingerprinting for digital images
    • J. Dittmann, A. Behr, M. Stabenau, P. Schmitt, J. Schwenk, and J. Ueberberg. Combining digital watermarks and collusion secure fingerprinting for digital images. In Proceedings of SPIE, volume 3657, pages 171-182, 1999.
    • (1999) Proceedings of SPIE , vol.3657 , pp. 171-182
    • Dittmann, J.1    Behr, A.2    Stabenau, M.3    Schmitt, P.4    Schwenk, J.5    Ueberberg, J.6
  • 6
    • 84957610906 scopus 로고    scopus 로고
    • A note on the limits of collusion-resistant watermarks
    • Advances in Cryptology - EUROCRYPT'99, Springer-Verlag, Berlin, Heidelberg, New York
    • F. Ergun, J. Kilian, and R. Kumar. A note on the limits of collusion-resistant watermarks. In Advances in Cryptology - EUROCRYPT'99, Lecture Notes in Computer Science, volume 1592, pages 140-149. Springer-Verlag, Berlin, Heidelberg, New York, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 140-149
    • Ergun, F.1    Kilian, J.2    Kumar, R.3
  • 7
    • 84957076207 scopus 로고    scopus 로고
    • Dynamic traitor tracing
    • Advances in Cryptology CRYPTO'99, Springer-Verlag, Berlin, Heidelberg, New York
    • A. Fiat and T. Tassa. Dynamic traitor tracing. In Advances in Cryptology CRYPTO'99, Lecture Notes in Computer Science, volume 1666, pages 354-371. Springer-Verlag, Berlin, Heidelberg, New York, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 354-371
    • Fiat, A.1    Tassa, T.2
  • 8
  • 9
    • 84957067564 scopus 로고    scopus 로고
    • Efficient methods for integrating traceability and broadcast encryption
    • Advances in Cryptology - CRYPTO'99, Springer-Verlag, Berlin, Heidelberg, New York
    • E. Gafni, J. Staddon, and Y. L. Yin. Efficient methods for integrating traceability and broadcast encryption. In Advances in Cryptology - CRYPTO'99, Lecture Notes in Computer Science, volume 1666, pages 372-387. Springer-Verlag, Berlin, Heidelberg, New York, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 372-387
    • Gafni, E.1    Staddon, J.2    Yin, Y.L.3
  • 10
    • 0003460538 scopus 로고    scopus 로고
    • Ph.D Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, USA
    • V. Guruswami. List decoding of error-correcting codes. Ph.D Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, USA, 2001.
    • (2001) List Decoding of Error-correcting Codes
    • Guruswami, V.1
  • 11
    • 0033183669 scopus 로고    scopus 로고
    • Improved decoding of Reed-Solomon and algebraicgeometry codes
    • V. Guruswami and M. Sudan. Improved decoding of Reed-Solomon and algebraicgeometry codes. IEEE Transactions on Information Theory, Vol. 45, No. 6:1757-1767, 1999.
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.6 , pp. 1757-1767
    • Guruswami, V.1    Sudan, M.2
  • 12
    • 84947944329 scopus 로고    scopus 로고
    • Error- and collusion-secure fingerprinting for digital data
    • Information Hiding'99, Springer-Verlag, Berlin, Heidelberg, New York
    • H. Guth and B. Pfitzmann. Error- and collusion-secure fingerprinting for digital data. In Information Hiding'99, Lecture Notes in Computer Science, volume 1768, pages 134-145. Springer-Verlag, Berlin, Heidelberg, New York, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1768 , pp. 134-145
    • Guth, H.1    Pfitzmann, B.2
  • 14
    • 84880901368 scopus 로고    scopus 로고
    • Self protecting pirates and black-box traitor tracing
    • Advances in Cryptology - CRYPTO'01, Springer-Verlag, Berlin, Heidelberg, New York
    • A. Kiayias and M. Yung. Self protecting pirates and black-box traitor tracing. In Advances in Cryptology - CRYPTO'01, Lecture Notes in Computer Science, volume 2139, pages 63-79. Springer-Verlag, Berlin, Heidelberg, New York, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 63-79
    • Kiayias, A.1    Yung, M.2
  • 15
    • 84959054452 scopus 로고    scopus 로고
    • On crafty pirate and foxy tracers
    • Security and Privacy in Digital Rights Management (SPDRM 2001), Springer-Verlag, Berlin, Heidelberg, New York
    • A. Kiayias and M. Yung. On crafty pirate and foxy tracers. In Security and Privacy in Digital Rights Management (SPDRM 2001), Lecture Notes in Computer Science, volume 2320, pages 22-39. Springer-Verlag, Berlin, Heidelberg, New York, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2320 , pp. 22-39
    • Kiayias, A.1    Yung, M.2
  • 18
    • 0003262491 scopus 로고    scopus 로고
    • Optimum traitor tracing and asymmetric schemes
    • Advances in Cryptology - EUROCRYPT'98, Springer-Verlag, Berlin, Heidelberg, New York
    • K. Kurosawa and Y. Desmedt. Optimum traitor tracing and asymmetric schemes. In Advances in Cryptology - EUROCRYPT'98, Lecture Notes in Computer Science, volume 1462, pages 502-517. Springer-Verlag, Berlin, Heidelberg, New York, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1462 , pp. 502-517
    • Kurosawa, K.1    Desmedt, Y.2
  • 19
    • 84954420982 scopus 로고    scopus 로고
    • Trials of traced traitors
    • Information Hiding, Springer-Verlag, Berlin, Heidelberg, New York
    • B. Pfitzmann. Trials of traced traitors. In Information Hiding, Lecture Notes in Computer Science, volume 1174, pages 49-64. Springer-Verlag, Berlin, Heidelberg, New York, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1174 , pp. 49-64
    • Pfitzmann, B.1
  • 20
    • 84974601983 scopus 로고    scopus 로고
    • Sequential traitor tracing
    • Advances in Cryptology - CRYPTO 2000, Springer-Verlag, Berlin, Heidelberg, New York
    • R. Safavi-Naini and Y. Wang. Sequential traitor tracing. In Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science, volume 1880, pages 316-332. Springer-Verlag, Berlin, Heidelberg, New York, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 316-332
    • Safavi-Naini, R.1    Wang, Y.2
  • 21
    • 0035504864 scopus 로고    scopus 로고
    • New results on frameproof codes and traceability schemes
    • R. Safavi-Naini and Y. Wang. New results on frameproof codes and traceability schemes. IEEE Transactions on Information Theory, Vol. 47, No. 7:3029-3033, 2001.
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.7 , pp. 3029-3033
    • Safavi-Naini, R.1    Wang, Y.2
  • 22
    • 84959043688 scopus 로고    scopus 로고
    • Collusion secure q-ary fingerprinting for perceptual content
    • Security and Privacy in Digital Rights Management (SPDRM 2001), Springer-Verlag, Berlin, Heidelberg, New York
    • R. Safavi-Naini and Y. Wang. Collusion secure q-ary fingerprinting for perceptual content. In Security and Privacy in Digital Rights Management (SPDRM 2001), Lecture Notes in Computer Science, volume 2320, pages 57-75. Springer-Verlag, Berlin, Heidelberg, New York, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2320 , pp. 57-75
    • Safavi-Naini, R.1    Wang, Y.2
  • 23
    • 84974733414 scopus 로고    scopus 로고
    • Frameproof and IPP codes
    • Progress in Cryptology - INDOCRYPT 2001, Springer-Verlag, Berlin, Heidelberg, New York
    • P. Sarkar and D. R. Stinson. Frameproof and IPP codes. In Progress in Cryptology - INDOCRYPT 2001, Lecture Notes in Computer Science, volume 2247, pages 117-126. Springer-Verlag, Berlin, Heidelberg, New York, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2247 , pp. 117-126
    • Sarkar, P.1    Stinson, D.R.2
  • 24
    • 77955708529 scopus 로고    scopus 로고
    • Efficient traitor tracing algorithms using list decoding
    • Advances in Cryptology - ASIACRYPT'01, Springer-Verlag, Berlin, Heidelberg, New York
    • A. Silverberg, J. Staddon, and J. Walker. Efficient traitor tracing algorithms using list decoding. In Advances in Cryptology - ASIACRYPT'01, Lecture Notes in Computer Science, volume 2248, pages 175-192. Springer-Verlag, Berlin, Heidelberg, New York, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2248 , pp. 175-192
    • Silverberg, A.1    Staddon, J.2    Walker, J.3
  • 25
    • 0035270516 scopus 로고    scopus 로고
    • Combinatorial properties of flameproof and traceability codes
    • J. N. Staddon, D. R. Stinson, and R. Wei. Combinatorial properties of flameproof and traceability codes. IEEE transactions on information theory, Vol. 47, No. 3:1042-1049, 2001.
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.3 , pp. 1042-1049
    • Staddon, J.N.1    Stinson, D.R.2    Wei, R.3
  • 26
    • 0002016098 scopus 로고    scopus 로고
    • Combinatorial properties and constructions of traceability schemes and frameproof codes
    • D. Stinson and R. Wei. Combinatorial properties and constructions of traceability schemes and frameproof codes. SIAM Journal on Discrete Mathematics, 11:41-53, 1998.
    • (1998) SIAM Journal on Discrete Mathematics , vol.11 , pp. 41-53
    • Stinson, D.1    Wei, R.2
  • 27
    • 84890047469 scopus 로고    scopus 로고
    • Key preassigned traceability schemes for broadcast encryption
    • Proceedings of SAC'98, Springer-Verlag, Berlin, Heidelberg, New York
    • D. R. Stinson and R. Wei. Key preassigned traceability schemes for broadcast encryption. In Proceedings of SAC'98, Lecture Notes in Computer Science, volume 1556, pages 144-156. Springer-Verlag, Berlin, Heidelberg, New York, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1556 , pp. 144-156
    • Stinson, D.R.1    Wei, R.2
  • 28
    • 0031097176 scopus 로고    scopus 로고
    • Decoding of Reed Solomon codes beyond the error-correction bound
    • M. Sudan. Decoding of Reed Solomon codes beyond the error-correction bound. Journal of Complexity, 13:180-193, 1997.
    • (1997) Journal of Complexity , vol.13 , pp. 180-193
    • Sudan, M.1
  • 29
    • 0004089464 scopus 로고    scopus 로고
    • Introduction to Coding Theory
    • Springer-Verlag, New York
    • J. H. van Lint. Introduction to Coding Theory. Graduate texts in mathematics. Springer-Verlag, New York, 1999.
    • (1999) Graduate Texts in Mathematics
    • Van Lint, J.H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.