메뉴 건너뛰기




Volumn 3, Issue 3, 2008, Pages 475-487

Lookup-table-based secure client-side embedding for spread-spectrum watermarks

Author keywords

Copyright protection; Fingerprinting; Forensic tracking; Stream cipher; Watermarking

Indexed keywords

CHLORINE COMPOUNDS; PAPERMAKING; TABLE LOOKUP;

EID: 49549083913     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2008.926988     Document Type: Article
Times cited : (62)

References (22)
  • 2
    • 85032751517 scopus 로고    scopus 로고
    • Digital rights management in consumer electronics products
    • Feb
    • W. Jonker and J.-P. Linnartz, "Digital rights management in consumer electronics products," IEEE Signal Process. Mag., vol. 21, no. 2, pp. 82-91, Feb. 2004.
    • (2004) IEEE Signal Process. Mag , vol.21 , Issue.2 , pp. 82-91
    • Jonker, W.1    Linnartz, J.-P.2
  • 3
    • 49549109669 scopus 로고    scopus 로고
    • Chicago man arrested for criminal copyright infringement in connection with prohibited release of major motion pictures, many prior to their theatrical release, U.S. Dept. Justice Press Release, 2004 [Online]. Available: http://www.justice.gov/criminal/cybercrime/spragueArrest.htm.
    • "Chicago man arrested for criminal copyright infringement in connection with prohibited release of major motion pictures, many prior to their theatrical release," U.S. Dept. Justice Press Release, 2004 [Online]. Available: http://www.justice.gov/criminal/cybercrime/spragueArrest.htm.
  • 4
    • 49549103163 scopus 로고    scopus 로고
    • Digital cinema system specification V1.1, Digital Cinema Initiatives, LLC, 2007 [Online]. Available: http://www.dci-movies.com/ DCI_DCinema_System_Spec_v1_1.pdf, Std
    • "Digital cinema system specification V1.1," Digital Cinema Initiatives, LLC, 2007 [Online]. Available: http://www.dci-movies.com/ DCI_DCinema_System_Spec_v1_1.pdf, Std
  • 5
    • 30844455362 scopus 로고    scopus 로고
    • Electronic content delivery and forensic watermarking
    • Dec
    • M. van der Veen, A. Lemma, and T. Kalker, "Electronic content delivery and forensic watermarking," ACM Multimedia Syst. J., vol. 11, no. 2, Dec. 2005.
    • (2005) ACM Multimedia Syst. J , vol.11 , Issue.2
    • van der Veen, M.1    Lemma, A.2    Kalker, T.3
  • 6
    • 36348943848 scopus 로고    scopus 로고
    • A method and apparatus for generating multiple watermarked copies of an information signal
    • J. Crowcroft, C. Perkins, and I. Brown, "A method and apparatus for generating multiple watermarked copies of an information signal," WO Patent/56059, 2000.
    • (2000) WO Patent/56059
    • Crowcroft, J.1    Perkins, C.2    Brown, I.3
  • 8
    • 49549121884 scopus 로고    scopus 로고
    • J. Benaloh, Key compression and its application to digital finger-printing, Microsoft Res., Tech. Rep., 2000, see also U.S. 6 886 098.
    • J. Benaloh, "Key compression and its application to digital finger-printing," Microsoft Res., Tech. Rep., 2000, see also U.S. 6 886 098.
  • 9
    • 84904254949 scopus 로고    scopus 로고
    • Large scale distributed watermarking of multicast media through encryption
    • R. Parviainen and P. Parnes, "Large scale distributed watermarking of multicast media through encryption," in Proc. IFIP TC6 TC11, 2001, pp. 149-158.
    • (2001) Proc. IFIP TC6 TC11 , pp. 149-158
    • Parviainen, R.1    Parnes, P.2
  • 10
    • 33750560169 scopus 로고    scopus 로고
    • Attacks and forensic analysis for multimedia content protection
    • presented at the, Amsterdam, The Netherlands
    • H. Jin and J. Lotspiech, "Attacks and forensic analysis for multimedia content protection," presented at the Int. Conf. Multimedia Expo., Amsterdam, The Netherlands, 2005.
    • (2005) Int. Conf. Multimedia Expo
    • Jin, H.1    Lotspiech, J.2
  • 11
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Sep
    • D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1897-1905, Sep. 1998.
    • (1998) IEEE Trans. Inf. Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 13
    • 4544310181 scopus 로고    scopus 로고
    • A secure multicast protocol with copyright protection
    • Apr
    • H. Chu, L. Qiao, and K. Nahrstedt, "A secure multicast protocol with copyright protection," ACM Comp. Commun. Rev., vol. 32, no. 2, pp. 42-60, Apr. 2002.
    • (2002) ACM Comp. Commun. Rev , vol.32 , Issue.2 , pp. 42-60
    • Chu, H.1    Qiao, L.2    Nahrstedt, K.3
  • 14
    • 11144253373 scopus 로고    scopus 로고
    • Video fingerprinting and encryption principles for digital rights management
    • Jun
    • D. Kundur and K. Karthik, "Video fingerprinting and encryption principles for digital rights management," Proc. IEEE, vol. 92, no. 6, pp. 918-932, Jun. 2004.
    • (2004) Proc. IEEE , vol.92 , Issue.6 , pp. 918-932
    • Kundur, D.1    Karthik, K.2
  • 18
    • 0042826822 scopus 로고    scopus 로고
    • Independent component analysis: Algorithms and applications
    • A. Hyvärinen and E. Oja, "Independent component analysis: Algorithms and applications," Neural Netw., vol. 13, no. 4-5, pp. 411-430, 2000.
    • (2000) Neural Netw , vol.13 , Issue.4-5 , pp. 411-430
    • Hyvärinen, A.1    Oja, E.2
  • 22
    • 0023364252 scopus 로고
    • Real-valued fast fourier transform algorithms
    • Jun
    • H. Sorensen, D. Jones, M. Heideman, and C. Burrus, "Real-valued fast fourier transform algorithms," IEEE Trans. Signal Process., vol. SP-35, no. 6, pp. 849-863, Jun. 1987.
    • (1987) IEEE Trans. Signal Process , vol.SP-35 , Issue.6 , pp. 849-863
    • Sorensen, H.1    Jones, D.2    Heideman, M.3    Burrus, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.