-
1
-
-
84957670625
-
Collusion-secure fingerprinting for digital data
-
D. Coppersmith, Ed. New York: Springer Lecture Notes in Computer Science
-
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," in Proc. Crypto '95, D. Coppersmith, Ed. New York: Springer, 1995, vol.963, Lecture Notes in Computer Science, pp. 452-465.
-
(1995)
Proc. Crypto '95
, vol.963
, pp. 452-465
-
-
Boneh, D.1
Shaw, J.2
-
2
-
-
0030388964
-
Secure spread spectrum watermarking for images, audio, and video
-
I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for images, audio, and video," in IEEE Int. Conf. Image Processing (ICIP), 1996, vol.III, pp. 243-246.
-
(1996)
IEEE Int. Conf. Image Processing (ICIP)
, vol.3
, pp. 243-246
-
-
Cox, I.J.1
Killian, J.2
Leighton, T.3
Shamoon, T.4
-
3
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
Dec. (originally published in 1995 as NEC TR 95-10)
-
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol.6, no.12, pp. 1673-1687, Dec. 1997, (originally published in 1995 as NEC TR 95-10).
-
(1997)
IEEE Trans. Image Process
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
4
-
-
84890411878
-
Resistance of digital watermarks to collusive attacks
-
J. Kilian, F. Leighton, L. Matheson, T. Shamoon, R. Tarjan, and F. Zane, "Resistance of digital watermarks to collusive attacks," in IEEE Int. Symp. Information Theory, 1998, pp. 271-1271
-
(1998)
IEEE Int. Symp. Information Theory
, pp. 271-1271
-
-
Kilian, J.1
Leighton, F.2
Matheson, L.3
Shamoon, T.4
Tarjan, R.5
Zane, F.6
-
5
-
-
84957610906
-
A note on the bounds of collusion resistant watermarks
-
F. Ergun, J. Kilian, and R. Kumar, "A note on the bounds of collusion resistant watermarks," in EUROCRYPT'99, 1999, pp. 140-149.
-
(1999)
EUROCRYPT'99
, pp. 140-149
-
-
Ergun, F.1
Kilian, J.2
Kumar, R.3
-
7
-
-
20444373301
-
Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation
-
DOI 10.1109/TIP.2005.847284
-
Z. Wang, M. Wu, H. Zhao, W. Trappe, and K. Liu, "Collusion resistance of multimedia fingerprinting using orthogonal modulation," IEEE Trans. Image Process., vol.14, no.6, pp. 804-821, Jun. 2005. (Pubitemid 40794812)
-
(2005)
IEEE Transactions on Image Processing
, vol.14
, Issue.6
, pp. 804-821
-
-
Wang, Z.J.1
Wu, M.2
Zhao, H.V.3
Trappe, W.4
Liu, K.J.R.5
-
10
-
-
0024718199
-
Multidimensional constellations. I. Introduction, figures of merit, and generalized cross constellations
-
Aug.
-
G. D. Forney, Jr and L.-F. Wei, "Multidimensional constellations. I. Introduction, figures of merit, and generalized cross constellations," IEEEJ. Sel. Areas Commun., vol.7, no.6, pp. 877-892, Aug. 1989.
-
(1989)
IEEEJ. Sel. Areas Commun.
, vol.7
, Issue.6
, pp. 877-892
-
-
Forney Jr, G.D.1
Wei, L.-F.2
-
14
-
-
44049106752
-
A framework for optimizing nonlinear collusion attacks on fingerprinting systems
-
Princeton, NJ
-
N. Kiyavash and P. Moulin, "A framework for optimizing nonlinear collusion attacks on fingerprinting systems," in Proc. Conf. Information Sciences and Systems (CISS), Princeton, NJ, 2006.
-
(2006)
Proc. Conf. Information Sciences and Systems (CISS)
-
-
Kiyavash, N.1
Moulin, P.2
-
15
-
-
69749101534
-
Performance of orthogonal fingerprinting codes under worst-case noise
-
DOI:10.1109/TIFS.2009.2026462
-
N. Kiyavash and P. Moulin, "Performance of orthogonal fingerprinting codes under worst-case noise," IEEE Inf. Forensics Security DOI:10.1109/TIFS.2009.2026462.
-
IEEE Inf. Forensics Security
-
-
Kiyavash, N.1
Moulin, P.2
-
16
-
-
51649122753
-
Expurgated Gaussian fingerprinting codes
-
Nice, France
-
P. Moulin and N. Kiyavash, "Expurgated Gaussian fingerprinting codes," in IEEE Int. Symp. Information Theory (ISIT), Nice, France, 2007, pp. 711-715.
-
(2007)
IEEE Int. Symp. Information Theory (ISIT)
, pp. 711-715
-
-
Moulin, P.1
Kiyavash, N.2
|