메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1425-1428

Optimal gaussian fingerprint decoders

Author keywords

Coding; Decoding; Digital fingerprinting

Indexed keywords

CAPACITY LIMIT; CODE RATES; CODING; COLLUDERS; CORRELATION STATISTICS; DECODING METHODS; DIGITAL FINGERPRINTING; GAUSSIANS; MATHEMATICAL FRAMEWORKS; MUTUAL INFORMATIONS; RELIABLE PERFORMANCE; SOCIAL NETWORKS; SQUARED DISTORTION; THRESHOLDING;

EID: 70349203842     PISSN: 15206149     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICASSP.2009.4959861     Document Type: Conference Paper
Times cited : (5)

References (11)
  • 1
    • 0031362116 scopus 로고    scopus 로고
    • I. J. Cox, J. Killian, F. T. Leighton and T. Shamoon, Secure Spread Spectrum Watermarking for Multimedia, IEEE T-IP, 6, pp. 1673-1687, Dec. 1997. (Also NEC Tech. Rep. 95-10, 1995).
    • I. J. Cox, J. Killian, F. T. Leighton and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE T-IP, Vol. 6, pp. 1673-1687, Dec. 1997. (Also NEC Tech. Rep. 95-10, 1995).
  • 2
    • 0037353686 scopus 로고    scopus 로고
    • Information-Theoretic Analysis of Information Hiding
    • P. Moulin and J. A. O'Sullivan, "Information-Theoretic Analysis of Information Hiding," IEEE T-IT, Vol. 49, No. 3, pp. 563-593, 2003.
    • (2003) IEEE T-IT , vol.49 , Issue.3 , pp. 563-593
    • Moulin, P.1    O'Sullivan, J.A.2
  • 3
    • 0141973684 scopus 로고    scopus 로고
    • On the Capacity Game of Private Fingerprinting Systems Under Collusion Attacks
    • Yokohama, Japan, p, July
    • A. Somekh-Baruch and N. Merhav, "On the Capacity Game of Private Fingerprinting Systems Under Collusion Attacks," Proc. IEEE Int. Symp. on Info. Theory, Yokohama, Japan, p. 191, July 2003.
    • (2003) Proc. IEEE Int. Symp. on Info. Theory , pp. 191
    • Somekh-Baruch, A.1    Merhav, N.2
  • 6
    • 34548257265 scopus 로고    scopus 로고
    • Capacity and Optimal Collusion Attack Channels for Gaussian Fingerprinting Games
    • San Jose, CA, Jan
    • Y. Wang and P. Moulin, "Capacity and Optimal Collusion Attack Channels for Gaussian Fingerprinting Games," Proc. SPIE, San Jose, CA, Jan. 2007.
    • (2007) Proc. SPIE
    • Wang, Y.1    Moulin, P.2
  • 7
    • 34547501489 scopus 로고    scopus 로고
    • Analysis of Attacks on Image Watermarks With Randomized Coefficients
    • Princeton, NJ
    • H. S. Stone, "Analysis of Attacks on Image Watermarks With Randomized Coefficients," NEC TR 96-045, Princeton, NJ, 1996.
    • (1996) NEC TR 96-045
    • Stone, H.S.1
  • 8
    • 18844450187 scopus 로고    scopus 로고
    • Forensic Analysis of Nonlinear Collusion Attacks for Multimedia Fingerprinting
    • May
    • H. Zhao, M. Wu, Z. Wang and K. J. R. Liu, "Forensic Analysis of Nonlinear Collusion Attacks for Multimedia Fingerprinting," IEEE TIP, Vol. 14, No. 5, pp. 646-661, May 2005.
    • (2005) IEEE TIP , vol.14 , Issue.5 , pp. 646-661
    • Zhao, H.1    Wu, M.2    Wang, Z.3    Liu, K.J.R.4
  • 9
    • 44049106752 scopus 로고    scopus 로고
    • A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems
    • Princeton, NJ, March
    • N. Kiyavash and P. Moulin, "A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems," Proc. Conf. on Information Systems and Science, Princeton, NJ, March 2006.
    • (2006) Proc. Conf. on Information Systems and Science
    • Kiyavash, N.1    Moulin, P.2
  • 11
    • 84907062399 scopus 로고
    • Probability of Error for Optimal Codes in a Gaussian Channel
    • C. E. Shannon, "Probability of Error for Optimal Codes in a Gaussian Channel," Bell Systems Tech. J., Vol. 38, pp. 611-656, 1959.
    • (1959) Bell Systems Tech. J , vol.38 , pp. 611-656
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.