메뉴 건너뛰기




Volumn 2010, Issue , 2010, Pages

On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol

Author keywords

[No Author keywords available]

Indexed keywords


EID: 77952507577     PISSN: 16874161     EISSN: 2510523X     Source Type: Journal    
DOI: 10.1155/2010/694797     Document Type: Article
Times cited : (19)

References (29)
  • 2
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Boneh D., Shaw J., Collusion-secure fingerprinting for digital data IEEE Transactions on Information Theory 1998 44 5 1897 1905
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 6
    • 84937405827 scopus 로고    scopus 로고
    • Anonymous fingerprinting with direct non-repudiation
    • Springer Lecture Notes in Computer Science
    • Pfitzmann B., Sadeghi A., Anonymous fingerprinting with direct non-repudiation 1976 Proceedings of the Advances in Cryptology (ASIACRYPT 00) 2000 Springer 401 414 Lecture Notes in Computer Science
    • (2000) Proceedings of the Advances in Cryptology (ASIACRYPT 00) , vol.1976 , pp. 401-414
    • Pfitzmann, B.1    Sadeghi, A.2
  • 7
    • 84937417240 scopus 로고    scopus 로고
    • Efficient anonymous fingerprinting with group signatures
    • Springer Lecture Notes in Computer Science
    • Camenisch J., Efficient anonymous fingerprinting with group signatures 1976 Proceedings of the Advances in Cryptology (ASIACRYPT 00) 2000 Springer 415 428 Lecture Notes in Computer Science
    • (2000) Proceedings of the Advances in Cryptology (ASIACRYPT 00) , vol.1976 , pp. 415-428
    • Camenisch, J.1
  • 9
    • 28844473947 scopus 로고    scopus 로고
    • Fingerprinting protocol for images based on additive homomorphic property
    • Kuribayashi M., Tanaka H., Fingerprinting protocol for images based on additive homomorphic property IEEE Transactions on Image Processing 2005 14 12 2129 2139
    • (2005) IEEE Transactions on Image Processing , vol.14 , Issue.12 , pp. 2129-2139
    • Kuribayashi, M.1    Tanaka, H.2
  • 13
    • 84956852274 scopus 로고    scopus 로고
    • A new public-key cryptosystem as secure as factoring
    • Springer Lecture Notes in Computer Science
    • Okamoto T., Uchiyama S., A new public-key cryptosystem as secure as factoring 1403 Proceedings of the Advances in Crypgology (EUROCRYPT 98) 1998 Springer 308 318 Lecture Notes in Computer Science
    • (1998) Proceedings of the Advances in Crypgology (EUROCRYPT 98) , vol.1403 , pp. 308-318
    • Okamoto, T.1    Uchiyama, S.2
  • 14
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Springer Lecture Notes in Computer Science
    • Paillier P., Public-key cryptosystems based on composite degree residuosity classes 1592 Proceedings of the Advances in Crypgology (EUROCRYPT 99) 1999 Springer 223 238 Lecture Notes in Computer Science
    • (1999) Proceedings of the Advances in Crypgology (EUROCRYPT 99) , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 17
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • Rivest R. L., Shamir A., Adleman L., A method for obtaining digital signatures and public key cryptosystems Communications of the ACM 1978 21 2 120 126
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 19
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • DOI 10.1109/18.923725, PII S0018944801028346
    • Chen B., Wornell G. W., Quantization index modulation: a class of provably good methods for digital watermarking and information embedding IEEE Transactions on Information Theory 2001 47 4 1423 1443 (Pubitemid 32508483)
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 21
    • 18844450187 scopus 로고    scopus 로고
    • Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
    • Zhao H. V., Wu M., Wang Z. J., Liu K. J. R., Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting IEEE Transactions on Image Processing 2005 14 5 646 661
    • (2005) IEEE Transactions on Image Processing , vol.14 , Issue.5 , pp. 646-661
    • Zhao, H.V.1    Wu, M.2    Wang, Z.J.3    Liu, K.J.R.4
  • 24
    • 84937541590 scopus 로고    scopus 로고
    • Improved boneh-shaw content fingerprinting
    • Springer Lecture Notes in Computer Science
    • Yacobi Y., Improved boneh-shaw content fingerprinting 2020 Proceedings of Topics in Cryptology (CT-RSA 01) 2001 Springer 378 391 Lecture Notes in Computer Science
    • (2001) Proceedings of Topics in Cryptology (CT-RSA 01) , vol.2020 , pp. 378-391
    • Yacobi, Y.1
  • 25
    • 0037851033 scopus 로고    scopus 로고
    • Robust optimum detection of transform domain multiplicative watermarks
    • Cheng Q., Huang T. S., Robust optimum detection of transform domain multiplicative watermarks IEEE Transactions on Signal Processing 2003 51 4 906 924
    • (2003) IEEE Transactions on Signal Processing , vol.51 , Issue.4 , pp. 906-924
    • Cheng, Q.1    Huang, T.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.