-
1
-
-
0031362116
-
-
I. J. Cox, J. Killian, F. T. Leighton and T. Shamoon, Secure Spread Spectrum Watermarking for Multimedia, IEEE T-IP, 6, pp. 1673-1687, Dec. 1997. (Also NEC Tech. Rep. 95-10, 1995).
-
I. J. Cox, J. Killian, F. T. Leighton and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE T-IP, Vol. 6, pp. 1673-1687, Dec. 1997. (Also NEC Tech. Rep. 95-10, 1995).
-
-
-
-
2
-
-
0037353686
-
Information-Theoretic Analysis of Information Hiding
-
P. Moulin and J. A. O'Sullivan, "Information-Theoretic Analysis of Information Hiding," IEEE T-IT, Vol. 49, No. 3, pp. 563-593, 2003.
-
(2003)
IEEE T-IT
, vol.49
, Issue.3
, pp. 563-593
-
-
Moulin, P.1
O'Sullivan, J.A.2
-
3
-
-
0141973684
-
On the Capacity Game of Private Fingerprinting Systems Under Collusion Attacks
-
Yokohama, Japan, p, July
-
A. Somekh-Baruch and N. Merhav, "On the Capacity Game of Private Fingerprinting Systems Under Collusion Attacks," Proc. IEEE Int. Symp. on Info. Theory, Yokohama, Japan, p. 191, July 2003.
-
(2003)
Proc. IEEE Int. Symp. on Info. Theory
, pp. 191
-
-
Somekh-Baruch, A.1
Merhav, N.2
-
4
-
-
52349091655
-
Universal Fingerprinting: Capacity and Random Coding Exponents
-
Toronto, Canada, July
-
P. Moulin, "Universal Fingerprinting: Capacity and Random Coding Exponents," preprint, Jan. 2008, revised Sep. 2008. Short version in Proc. ISIT, Toronto, Canada, July 2008.
-
(2008)
preprint, Jan. 2008, revised Sep. 2008. Short version in Proc. ISIT
-
-
Moulin, P.1
-
5
-
-
84890411878
-
Resistance of digital watermarks to collusive attacks
-
Cambridge, MA
-
J. Kilian, F. T. Leighton, L. R. Matheson, T. G. Shamoon, R. E. Tarjan, and F. Zane, "Resistance of digital watermarks to collusive attacks," Proc. ISIT, p. 271, Cambridge, MA, 1998.
-
(1998)
Proc. ISIT
, pp. 271
-
-
Kilian, J.1
Leighton, F.T.2
Matheson, L.R.3
Shamoon, T.G.4
Tarjan, R.E.5
Zane, F.6
-
6
-
-
34548257265
-
Capacity and Optimal Collusion Attack Channels for Gaussian Fingerprinting Games
-
San Jose, CA, Jan
-
Y. Wang and P. Moulin, "Capacity and Optimal Collusion Attack Channels for Gaussian Fingerprinting Games," Proc. SPIE, San Jose, CA, Jan. 2007.
-
(2007)
Proc. SPIE
-
-
Wang, Y.1
Moulin, P.2
-
7
-
-
34547501489
-
Analysis of Attacks on Image Watermarks With Randomized Coefficients
-
Princeton, NJ
-
H. S. Stone, "Analysis of Attacks on Image Watermarks With Randomized Coefficients," NEC TR 96-045, Princeton, NJ, 1996.
-
(1996)
NEC TR 96-045
-
-
Stone, H.S.1
-
8
-
-
18844450187
-
Forensic Analysis of Nonlinear Collusion Attacks for Multimedia Fingerprinting
-
May
-
H. Zhao, M. Wu, Z. Wang and K. J. R. Liu, "Forensic Analysis of Nonlinear Collusion Attacks for Multimedia Fingerprinting," IEEE TIP, Vol. 14, No. 5, pp. 646-661, May 2005.
-
(2005)
IEEE TIP
, vol.14
, Issue.5
, pp. 646-661
-
-
Zhao, H.1
Wu, M.2
Wang, Z.3
Liu, K.J.R.4
-
9
-
-
44049106752
-
A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems
-
Princeton, NJ, March
-
N. Kiyavash and P. Moulin, "A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems," Proc. Conf. on Information Systems and Science, Princeton, NJ, March 2006.
-
(2006)
Proc. Conf. on Information Systems and Science
-
-
Kiyavash, N.1
Moulin, P.2
-
11
-
-
84907062399
-
Probability of Error for Optimal Codes in a Gaussian Channel
-
C. E. Shannon, "Probability of Error for Optimal Codes in a Gaussian Channel," Bell Systems Tech. J., Vol. 38, pp. 611-656, 1959.
-
(1959)
Bell Systems Tech. J
, vol.38
, pp. 611-656
-
-
Shannon, C.E.1
|