메뉴 건너뛰기




Volumn 33, Issue 1, 2009, Pages 3-24

Recent advances in multimedia information system security

Author keywords

Authentication; Copy detection; Data mining; Digital rights management; Encryption; Forensic; Multimedia system; Security; Watermark Biometric

Indexed keywords

COPY DETECTION; DIGITAL RIGHTS MANAGEMENT; ENCRYPTION; FORENSIC; SECURITY;

EID: 64249107623     PISSN: 03505596     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (90)

References (111)
  • 3
    • 33947233227 scopus 로고    scopus 로고
    • Security and privacy for multimedia database management systems
    • April
    • B. Thuraisingham. Security and privacy for multimedia database management systems, Multimedia Tools and Applications, 33(1): 13-29, April 2007.
    • (2007) Multimedia Tools and Applications , vol.33 , Issue.1 , pp. 13-29
    • Thuraisingham, B.1
  • 8
    • 64249144843 scopus 로고    scopus 로고
    • Open Mobile Alliance, Digital Rights Management 2.0 (OMA DRM 2.0), 03 Mar 2006.
    • Open Mobile Alliance, Digital Rights Management 2.0 (OMA DRM 2.0), 03 Mar 2006.
  • 13
    • 0035279159 scopus 로고    scopus 로고
    • Overview of fine granularity scalability in MPEG-4 video standard
    • W. Li. Overview of fine granularity scalability in MPEG-4 video standard, IEEE Transactions on Circuits and Systems for Video Technology, 11(3): 301-317, 2001.
    • (2001) IEEE Transactions on Circuits and Systems for Video Technology , vol.11 , Issue.3 , pp. 301-317
    • Li, W.1
  • 18
    • 43449097890 scopus 로고    scopus 로고
    • Efficient video encryption scheme based on advanced video coding
    • Springer
    • S. Lian, J. Sun, G. Liu, and Z. Wang. Efficient video encryption scheme based on advanced video coding, Multimedia Tools and Applications, Springer, 38(1): 75-89, 2008.
    • (2008) Multimedia Tools and Applications , vol.38 , Issue.1 , pp. 75-89
    • Lian, S.1    Sun, J.2    Liu, G.3    Wang, Z.4
  • 19
    • 0026173255 scopus 로고
    • Fast Fourier transform based speech encryption system
    • Speech and Vision
    • S. Sridharan, E. Dawson, and B. Goldburg. Fast Fourier transform based speech encryption system. IEE Proceedings of Communications, Speech and Vision, 138(3): 215-223, 1991.
    • (1991) IEE Proceedings of Communications , vol.138 , Issue.3 , pp. 215-223
    • Sridharan, S.1    Dawson, E.2    Goldburg, B.3
  • 23
    • 35248871615 scopus 로고    scopus 로고
    • Selective encryption of the JPEG2000 bitstream, IFIP International Federation for Information Processing
    • R. Norcen and A. Uhl, "Selective encryption of the JPEG2000 bitstream," IFIP International Federation for Information Processing, LNCS 2828, pp. 194-204, 2003.
    • (2003) LNCS , vol.2828 , pp. 194-204
    • Norcen, R.1    Uhl, A.2
  • 24
    • 34447252956 scopus 로고    scopus 로고
    • A selective image encryption scheme based on JPEG2000 Codec
    • 2004 Pacific-Rim Conference on Multimedia PCM2004
    • S. Lian, J. Sun, D. Zhang, and Z. Wang. A selective image encryption scheme based on JPEG2000 Codec. 2004 Pacific-Rim Conference on Multimedia (PCM2004), Springer LNCS, 3332, 65-72, 2004.
    • (2004) Springer LNCS , vol.3332 , pp. 65-72
    • Lian, S.1    Sun, J.2    Zhang, D.3    Wang, Z.4
  • 26
    • 0030419062 scopus 로고    scopus 로고
    • L. Tang. Methods for encrypting and decrypting MPEG video data efficiently. In Proceedings of the Fourth ACM International Multimedia Conference (ACM Multimedia'96). Boston, MA, November 1996, pp. 219-230.
    • L. Tang. Methods for encrypting and decrypting MPEG video data efficiently. In Proceedings of the Fourth ACM International Multimedia Conference (ACM Multimedia'96). Boston, MA, November 1996, pp. 219-230.
  • 28
    • 33645966853 scopus 로고    scopus 로고
    • Digital Video Scrambling Method Using Intra Prediction Mode
    • 2004 Pacific-Rim Conference on Multimedia PCM2004, Springer, November
    • J. Ahn, H. Shim, B. Jeon, and I. Choi. Digital Video Scrambling Method Using Intra Prediction Mode. 2004 Pacific-Rim Conference on Multimedia (PCM2004), Springer, LNCS Vol.3333, pp.386-393, November 2004.
    • (2004) LNCS , vol.3333 , pp. 386-393
    • Ahn, J.1    Shim, H.2    Jeon, B.3    Choi, I.4
  • 29
    • 0038273965 scopus 로고    scopus 로고
    • Efficient frequency domain selective scrambling of digital video
    • March
    • W. Zeng and S. Lei. Efficient frequency domain selective scrambling of digital video. IEEE Trans on Multimedia, 5(1): 118 -129, March 2003.
    • (2003) IEEE Trans on Multimedia , vol.5 , Issue.1 , pp. 118-129
    • Zeng, W.1    Lei, S.2
  • 30
    • 33746989201 scopus 로고    scopus 로고
    • Secure advanced video coding based on selective encryption algorithms
    • S. Lian, Z. Liu, Z. Ren, and H. Wang. Secure advanced video coding based on selective encryption algorithms. IEEE Transactions on Consumer Electronics, 52(2): 621-629, 2006.
    • (2006) IEEE Transactions on Consumer Electronics , vol.52 , Issue.2 , pp. 621-629
    • Lian, S.1    Liu, Z.2    Ren, Z.3    Wang, H.4
  • 33
    • 0034515656 scopus 로고    scopus 로고
    • M. Wu, E. Tang, and B. Liu, Data hiding in digital binary images, In Proc. IEEE Int'l Conf. on Multimedia and Expo, Jul 31-Aug 2, 2000, New York, NY, 393-396.
    • M. Wu, E. Tang, and B. Liu, Data hiding in digital binary images, In Proc. IEEE Int'l Conf. on Multimedia and Expo, Jul 31-Aug 2, 2000, New York, NY, 393-396.
  • 38
    • 0032691819 scopus 로고    scopus 로고
    • C. S. Collberg, and C. Thomborson, Software watermarking: models and dynamic embeddings, In Proc. ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL99), San Antonio, Texas, 1999, pp. 311-324.
    • C. S. Collberg, and C. Thomborson, "Software watermarking: models and dynamic embeddings," In Proc. ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL99), San Antonio, Texas, 1999, pp. 311-324.
  • 42
    • 0033601687 scopus 로고    scopus 로고
    • D. Coltue, and P. Bolon, Watermarking by histogram specification, In Proc. SPIE Electronic Imaging'99, Security and Watermarking of Multimedia Contents, San Jose, 1999, pp. 252-263.
    • D. Coltue, and P. Bolon, "Watermarking by histogram specification," In Proc. SPIE Electronic Imaging'99, Security and Watermarking of Multimedia Contents, San Jose, 1999, pp. 252-263.
  • 43
    • 0033601682 scopus 로고    scopus 로고
    • P. M. Rongen, M. B. Macs, and C. Overveld, Digital image watermarking by salient point modification, In Proc. SPIE Electronic Imaging'99, Security and Watermarking of Multimedia Content, San Jose, 1999, 3657, pp. 273-282.
    • P. M. Rongen, M. B. Macs, and C. Overveld, Digital image watermarking by salient point modification, In Proc. SPIE Electronic Imaging'99, Security and Watermarking of Multimedia Content, San Jose, 1999, vol. 3657, pp. 273-282.
  • 45
    • 0032069486 scopus 로고    scopus 로고
    • Robust audio watermarking using perceptual masking
    • M. D. Swanson, B. Zhu, A. H. Tewfik, and L. Boney. Robust audio watermarking using perceptual masking. Signal Processing, 66(3): 337-355, 1998.
    • (1998) Signal Processing , vol.66 , Issue.3 , pp. 337-355
    • Swanson, M.D.1    Zhu, B.2    Tewfik, A.H.3    Boney, L.4
  • 46
    • 0034140111 scopus 로고    scopus 로고
    • Joint wavelet and spatial transformation for digital watermarking
    • 241~245
    • M. J. Tsai, K. Y. Yu, Y. Z. Chen. Joint wavelet and spatial transformation for digital watermarking. IEEE Trans. on Consumer Electronics, 2000, 46(1): 241~245.
    • (2000) IEEE Trans. on Consumer Electronics , vol.46 , Issue.1
    • Tsai, M.J.1    Yu, K.Y.2    Chen, Y.Z.3
  • 48
    • 85032751604 scopus 로고    scopus 로고
    • Collusion-resistant fingerprinting for multimedia
    • March
    • M. Wu, W. Trappe, Z. J. Wang, and R. Liu, Collusion-resistant fingerprinting for multimedia. IEEE Signal Processing Magazine, March 2004, 21(2): 15-27.
    • (2004) IEEE Signal Processing Magazine , vol.21 , Issue.2 , pp. 15-27
    • Wu, M.1    Trappe, W.2    Wang, Z.J.3    Liu, R.4
  • 49
    • 33646766143 scopus 로고    scopus 로고
    • Y. Wu, Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting, IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005 (ICASSP '05). March 18-23, 2005, 2, pp. 13-16.
    • Y. Wu, "Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting," IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005 (ICASSP '05). March 18-23, 2005, Vol. 2, pp. 13-16.
  • 50
    • 84947900806 scopus 로고    scopus 로고
    • A. Herrigel, J. Oruanaidh, H. Petersen, S. Pereira, and T. Pun, Secure copyright protection techniques for digital images, In Second Information Hiding Workshop (IHW), LNCS 1525, Springer-Verlag, 1998, pp. 169-190.
    • A. Herrigel, J. Oruanaidh, H. Petersen, S. Pereira, and T. Pun, "Secure copyright protection techniques for digital images," In Second Information Hiding Workshop (IHW), LNCS 1525, Springer-Verlag, 1998, pp. 169-190.
  • 52
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Sept
    • D. Boneh, and J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Trans. Inform. Theory, 44 (5): 1897-1905, Sept. 1998.
    • (1998) IEEE Trans. Inform. Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 54
    • 33749625961 scopus 로고    scopus 로고
    • Collusion-resistant international de-synchronization for digital video fingerprinting
    • Y. Mao, and M. K. Mihcak, "Collusion-resistant international de-synchronization for digital video fingerprinting," IEEE Conference on Image Processing, 2005, vol. 1, pp. 237-240.
    • (2005) IEEE Conference on Image Processing , vol.1 , pp. 237-240
    • Mao, Y.1    Mihcak, M.K.2
  • 55
    • 38349014901 scopus 로고    scopus 로고
    • Collusion-resistant fingerprinting scheme based on the CDMA-technique
    • Second International Workshop on Security IWSEC
    • N. Hayashi, M. Kuribayashi, and M. Morii, Collusion-resistant fingerprinting scheme based on the CDMA-technique, Second International Workshop on Security (IWSEC 2007), LNCS 4752, pp. 28-43, 2007.
    • (2007) LNCS , vol.4752 , pp. 28-43
    • Hayashi, N.1    Kuribayashi, M.2    Morii, M.3
  • 57
    • 64249139952 scopus 로고    scopus 로고
    • S. Lian. Traitor tracing in mobile multimedia communication. In Handbook of Research on Mobile Multimedia (2nd edition), edited by Ismail Khalil Ibrahim. IGI Global, 2008.
    • S. Lian. Traitor tracing in mobile multimedia communication. In "Handbook of Research on Mobile Multimedia" (2nd edition), edited by Ismail Khalil Ibrahim. IGI Global, 2008.
  • 58
    • 64249145769 scopus 로고    scopus 로고
    • D. Simitopoulos, N. Zissis, P. Georgiadis, V. Emmanouilidis and M. G. Strintzis. Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD, ACM Informatica 33 (2009) 3-24 23 Multimedia Systems Journal, Special Issue on Multimedia Security, 9(3), 217-227, Sep. 2003.
    • D. Simitopoulos, N. Zissis, P. Georgiadis, V. Emmanouilidis and M. G. Strintzis. Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD, ACM Informatica 33 (2009) 3-24 23 Multimedia Systems Journal, Special Issue on Multimedia Security, 9(3), 217-227, Sep. 2003.
  • 59
    • 84957663275 scopus 로고    scopus 로고
    • Watercasting: Distributed watermarking of multicast media
    • Proceedings of International Workshop on Networked Group Communication, Springer-Verlag
    • I. Brown, C. Perkins, and J. Crowcroft. Watercasting: Distributed watermarking of multicast media. In Proceedings of International Workshop on Networked Group Communication, Springer-Verlag LNCS, 1736, pp. 286-300, 1999.
    • (1999) LNCS , vol.1736 , pp. 286-300
    • Brown, I.1    Perkins, C.2    Crowcroft, J.3
  • 60
    • 85143191445 scopus 로고    scopus 로고
    • J. Bloom, Security and rights management in digital cinema, in Proc. IEEE Int. Conf. Acoustic, Speech and Signal Processing, 4, pp. 712-715, 2003.
    • J. Bloom, "Security and rights management in digital cinema," in Proc. IEEE Int. Conf. Acoustic, Speech and Signal Processing, Vol. 4, pp. 712-715, 2003.
  • 62
  • 63
    • 84947921901 scopus 로고    scopus 로고
    • Chamleon - a new kind of stream cipher
    • Springer-Verlag, pp
    • R. Anderson and C. Manifavas. Chamleon - a new kind of stream cipher. LNCS, Fast Software Encryption, Springer-Verlag, pp. 107-113, 1997.
    • (1997) LNCS, Fast Software Encryption , pp. 107-113
    • Anderson, R.1    Manifavas, C.2
  • 64
    • 11144253373 scopus 로고    scopus 로고
    • Video fingerprinting and encryption principles for digital rights management
    • D. Kundur and K. Karthik, "Video fingerprinting and encryption principles for digital rights management," Proceedings of the IEEE, 92(6): 918-932, 2004.
    • (2004) Proceedings of the IEEE , vol.92 , Issue.6 , pp. 918-932
    • Kundur, D.1    Karthik, K.2
  • 66
    • 33845398262 scopus 로고    scopus 로고
    • Secure watermark embedding through partial encryption
    • Proceedings of International Workshop on Digital Watermarking IWDW 2006
    • A. N. Lemma, S. Katzenbeisser, M. U. Celik, and M. V. Veen. Secure watermark embedding through partial encryption. Proceedings of International Workshop on Digital Watermarking (IWDW 2006), Springer LNCS, 4283, 433-445, 2006.
    • (2006) Springer LNCS , vol.4283 , pp. 433-445
    • Lemma, A.N.1    Katzenbeisser, S.2    Celik, M.U.3    Veen, M.V.4
  • 67
    • 0032223822 scopus 로고    scopus 로고
    • A robust image authentication algorithm surviving JPEG lossy compression
    • C.-Y. Lin and S.-F. Chang. A robust image authentication algorithm surviving JPEG lossy compression. In SPIE Storage and Retrieval of Image/Video Databases, Vol. 3312, pp. 296-307 (1998).
    • (1998) SPIE Storage and Retrieval of Image/Video Databases , vol.3312 , pp. 296-307
    • Lin, C.-Y.1    Chang, S.-F.2
  • 68
    • 51849119078 scopus 로고    scopus 로고
    • Overview of stateof-the-art in digital image forensics, Book chapter, Part of Indian Statistical Institute Platinum Jubilee Monograph series titled
    • World Scientific Press
    • H. T. Sencar and N. Memon, Overview of stateof-the-art in digital image forensics, Book chapter, Part of Indian Statistical Institute Platinum Jubilee Monograph series titled 'Statistical Science and Interdisciplinary Research,' World Scientific Press (2008).
    • (2008) Statistical Science and Interdisciplinary Research
    • Sencar, H.T.1    Memon, N.2
  • 69
    • 13244251141 scopus 로고    scopus 로고
    • Exposing digital forgeries by detecting traces of re-sampling
    • A. C. Popescu and H. Farid. Exposing digital forgeries by detecting traces of re-sampling, IEEE Trans. Signal Processing, 53(2): 758-767 (2005).
    • (2005) IEEE Trans. Signal Processing , vol.53 , Issue.2 , pp. 758-767
    • Popescu, A.C.1    Farid, H.2
  • 70
    • 27844493797 scopus 로고    scopus 로고
    • Exposing digital forgeries in color filter array interpolated images
    • A. C. Popescu and H. Farid. Exposing digital forgeries in color filter array interpolated images, IEEE Trans. Signal Processing, 53(10): 3948-3959 (2005).
    • (2005) IEEE Trans. Signal Processing , vol.53 , Issue.10 , pp. 3948-3959
    • Popescu, A.C.1    Farid, H.2
  • 71
    • 38849195462 scopus 로고    scopus 로고
    • Exposing digital forgeries in video by detecting double MPEG compression
    • September 26-27, Geneva, Switzerland
    • W. Wang, and H. Farid. Exposing digital forgeries in video by detecting double MPEG compression, Proceedings of the 9th workshop on Multimedia & security (MM& Sec'06), September 26-27, 2006, Geneva, Switzerland (2006), pp. 35-42.
    • (2006) Proceedings of the 9th workshop on Multimedia & security (MM& Sec'06) , pp. 35-42
    • Wang, W.1    Farid, H.2
  • 72
    • 33748068816 scopus 로고    scopus 로고
    • Exposing digital forgeries by detecting inconsistencies in lighting
    • M. K. Johnson and H. Farid. Exposing digital forgeries by detecting inconsistencies in lighting, Proc. of ACM Multimedia Security Workshop (2005), pp. 1-10.
    • (2005) Proc. of ACM Multimedia Security Workshop , pp. 1-10
    • Johnson, M.K.1    Farid, H.2
  • 75
    • 33750910780 scopus 로고    scopus 로고
    • Exposing digital forgeries in scientific images
    • September 26-27, Geneva, Switzerland, pp
    • H. Farid. Exposing digital forgeries in scientific images. ACM MM& Sec'06, September 26-27, 2006, Geneva, Switzerland, pp. 29 - 36.
    • (2006) ACM MM& Sec'06 , pp. 29-36
    • Farid, H.1
  • 76
    • 84928742468 scopus 로고    scopus 로고
    • Discriminant local features selection using efficient density estimation in a large database
    • New York
    • A. Joly and O. Buisson. Discriminant local features selection using efficient density estimation in a large database, in Proc. ACM Int. workshop on Multimedia information retrieval, pp. 201-208, New York, 2005.
    • (2005) Proc. ACM Int. workshop on Multimedia information retrieval , pp. 201-208
    • Joly, A.1    Buisson, O.2
  • 77
    • 0035591459 scopus 로고    scopus 로고
    • Content-based retrieval using local descriptors: Problems and issues from a database perspective
    • L. Amsaleg and P. Gros. Content-based retrieval using local descriptors: Problems and issues from a database perspective, Pattern Anal. Appl., 4(2-3): 108-124, 2001.
    • (2001) Pattern Anal. Appl , vol.4 , Issue.2-3 , pp. 108-124
    • Amsaleg, L.1    Gros, P.2
  • 79
    • 0037372152 scopus 로고    scopus 로고
    • Content-based image copy detection
    • C. Kim. Content-based image copy detection, Signal Processing: Image Communication, 18(3): 169-184, 2003.
    • (2003) Signal Processing: Image Communication , vol.18 , Issue.3 , pp. 169-184
    • Kim, C.1
  • 80
    • 33646832581 scopus 로고    scopus 로고
    • Image copy detection with rotating tolerance
    • CIS, Springer, pp
    • M. Wu, C. Lin, and C. Chang. Image copy detection with rotating tolerance, In CIS 2005, Part I, LNAI 3801, Springer, pp. 464-469, 2005.
    • (2005) LNAI , vol.3801 , Issue.PART I , pp. 464-469
    • Wu, M.1    Lin, C.2    Chang, C.3
  • 81
    • 33745160704 scopus 로고    scopus 로고
    • A robust content-based copy detection scheme
    • IOS Press
    • M.-N. Wu, C.-C. Lin, C. Chang. A robust content-based copy detection scheme, Fundamenta Informaticae 71(2-3): 351-366, IOS Press, 2006.
    • (2006) Fundamenta Informaticae , vol.71 , Issue.2-3 , pp. 351-366
    • Wu, M.-N.1    Lin, C.-C.2    Chang, C.3
  • 83
    • 34547747797 scopus 로고    scopus 로고
    • A new approach to image copy detection based on extended feature sets
    • August
    • J.-H. Hsiao, C.-S. Chen, L.-F. Chien, M.-S. Chen. A new approach to image copy detection based on extended feature sets. IEEE Trans. Image Process, 16(8): 2069-2079, August 2007.
    • (2007) IEEE Trans. Image Process , vol.16 , Issue.8 , pp. 2069-2079
    • Hsiao, J.-H.1    Chen, C.-S.2    Chien, L.-F.3    Chen, M.-S.4
  • 85
    • 2142754478 scopus 로고    scopus 로고
    • V. S. Verykios, A. K. Elmagarmid, E. Bertino, Y. Saygin, andE. Dasseni. Association rule hiding, IEEE Transactions on Knowledge and Data Engineering, 16(4): 434-447, 2004.
    • V. S. Verykios, A. K. Elmagarmid, E. Bertino, Y. Saygin, andE. Dasseni. Association rule hiding, IEEE Transactions on Knowledge and Data Engineering, 16(4): 434-447, 2004.
  • 86
    • 0344990562 scopus 로고    scopus 로고
    • Using unknowns to prevent discovery of association rules
    • Y. Saygin, V. Verykios, and C. Clifton, Using unknowns to prevent discovery of association rules, SIGMOD Record, 30(4): 45-54, 2001.
    • (2001) SIGMOD Record , vol.30 , Issue.4 , pp. 45-54
    • Saygin, Y.1    Verykios, V.2    Clifton, C.3
  • 88
    • 0242709355 scopus 로고    scopus 로고
    • J. Vaidya and . Clifton, Privacy preserving association rule mining in vertically partitioned data, In the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2002), pp. 639-644.
    • J. Vaidya and . Clifton, Privacy preserving association rule mining in vertically partitioned data, In the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2002), pp. 639-644.
  • 92
    • 0242625281 scopus 로고    scopus 로고
    • A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, Privacy preserving mining of association rules, In Proceedings of the 8th ACM SIGKDDD International Conference on Knowledge Discovery and Data Mining (2002), pp. 217-228.
    • A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, Privacy preserving mining of association rules, In Proceedings of the 8th ACM SIGKDDD International Conference on Knowledge Discovery and Data Mining (2002), pp. 217-228.
  • 93
    • 64249167264 scopus 로고    scopus 로고
    • Biometrics. http://en.wikipedia.org/wiki/Biometrics.
    • Biometrics
  • 95
    • 64249141307 scopus 로고    scopus 로고
    • M. Krause and H. F. Tipton. Characteristics of Biometric Systems. In Handbook of Information Security Management. CRC Press, pp. 39-41.
    • M. Krause and H. F. Tipton. "Characteristics of Biometric Systems". In Handbook of Information Security Management. CRC Press, pp. 39-41.
  • 96
    • 64249100859 scopus 로고    scopus 로고
    • P. J. Philips, P. Grother, R. J. Micheals, D. M. Blackburn, E. Tabassi, and J. M. Bone. Face recognition vendor test 2002: Overview and Summary. http://www.frvt.org/DLs/FRVT-2002-Overview-and-Summary.pdf, March 2003.
    • P. J. Philips, P. Grother, R. J. Micheals, D. M. Blackburn, E. Tabassi, and J. M. Bone. Face recognition vendor test 2002: Overview and Summary. http://www.frvt.org/DLs/FRVT-2002-Overview-and-Summary.pdf, March 2003.
  • 99
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometricsbased authentication systems
    • N. K. Ratha, J. H. Connell, and R. M. Bolle. Enhancing security and privacy in biometricsbased authentication systems, IBM systems Journal, 40(3): 614-634, 2001.
    • (2001) IBM systems Journal , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 100
    • 0038223829 scopus 로고    scopus 로고
    • NIST SP 800-31, Online
    • NIST SP 800-31, Intrusion Detection Systems.(Online) http://csrc.nist.gov/-publications/nistpubs/index.html
    • Intrusion Detection Systems
  • 103
    • 64249137408 scopus 로고    scopus 로고
    • J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, and E. Stoner. State of the Practice of Intrusion Detection Technologies. TECHNICAL REPORT, CMU/SEI-99-TR-028, ESC-99-028, January 2000.
    • J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, and E. Stoner. State of the Practice of Intrusion Detection Technologies. TECHNICAL REPORT, CMU/SEI-99-TR-028, ESC-99-028, January 2000.
  • 104
    • 64249160896 scopus 로고    scopus 로고
    • R. Shane, The Trusted Computing Platform Emerges as Industry's First Comprehensive Approach to IT Security, 2006. (online) https://www.trustedcomputinggroup.org/news/Industry-Data/IDC-448-Web.pdf.
    • R. Shane, "The Trusted Computing Platform Emerges as Industry's First Comprehensive Approach to IT Security", 2006. (online) https://www.trustedcomputinggroup.org/news/Industry-Data/IDC-448-Web.pdf.
  • 106
    • 54349087136 scopus 로고    scopus 로고
    • Digital Rights Management for the Home TV based on scalable video coding
    • August
    • S. Lian. Digital Rights Management for the Home TV based on scalable video coding. IEEE Transactions on Consumer Electronics, 54(3): 1287-1293, August 2008.
    • (2008) IEEE Transactions on Consumer Electronics , vol.54 , Issue.3 , pp. 1287-1293
    • Lian, S.1
  • 108
  • 111
    • 3543105519 scopus 로고    scopus 로고
    • W. Hu, T. Tan, and S. Maybank. A survey on visual surveillance of object motion and behaviors. IEEE Trans. on Systems, Man and Cybernetics-Part C: Applications and Reviews, 34(3): 334-352, 2004.
    • W. Hu, T. Tan, and S. Maybank. A survey on visual surveillance of object motion and behaviors. IEEE Trans. on Systems, Man and Cybernetics-Part C: Applications and Reviews, 34(3): 334-352, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.