메뉴 건너뛰기




Volumn 4, Issue , 2005, Pages 1-264

Multimedia fingerprinting forensics for traitor tracing

Author keywords

[No Author keywords available]

Indexed keywords


EID: 83455204761     PISSN: 16872789     EISSN: 16872797     Source Type: Book Series    
DOI: 10.1155/9789775945181     Document Type: Article
Times cited : (40)

References (152)
  • 5
    • 0038520452 scopus 로고    scopus 로고
    • MPEG Committee, ISO/IEC JTC1/SC29/WG11/ N5525.
    • MPEG committee, "MPEG-7 overview," ISO/IEC JTC1/SC29/WG11/ N5525.
    • MPEG-7 Overview
  • 8
    • 0010730394 scopus 로고    scopus 로고
    • MPEG Committee, ISO/IEC JTC1/SC29/WG11/ N4801.
    • MPEG committee, "MPEG-21 overview," ISO/IEC JTC1/SC29/WG11/ N4801.
    • MPEG-21 Overview
  • 10
    • 84873672588 scopus 로고    scopus 로고
    • MPEG4 IPMP FPDAM, ISO/IEC 14 496-1: 2001/AMD3, ISO/IEC JTC 1/SC 29/WG11 N4701, March 2002
    • MPEG4 IPMP FPDAM, ISO/IEC 14 496-1: 2001/AMD3, ISO/IEC JTC 1/SC 29/WG11 N4701, March 2002.
  • 11
    • 0030419062 scopus 로고    scopus 로고
    • Methods for encrypting and decrypting MPEG video data efficiently
    • Boston, Mass, USA, November
    • L. Tang, "Methods for encrypting and decrypting MPEG video data efficiently," in Proc. 4th ACM International Conference onMultimedia (MULTIMEDIA '96), pp. 219-229, Boston, Mass, USA, November 1996.
    • (1996) Proc. 4th ACM International Conference OnMultimedia (MULTIMEDIA '96) , pp. 219-229
    • Tang, L.1
  • 12
    • 0038273965 scopus 로고    scopus 로고
    • Efficient frequency domain selective scrambling of digital video
    • W. Zeng and S. Lei, "Efficient frequency domain selective scrambling of digital video," IEEE Trans. Multimedia, vol. 5, no. 1, pp. 118-129, 2003.
    • (2003) IEEE Trans. Multimedia , vol.5 , Issue.1 , pp. 118-129
    • Zeng, W.1    Lei, S.2
  • 13
    • 0036612847 scopus 로고    scopus 로고
    • AndW. Jin, "a format-compliant configurable encryption framework for access control of video
    • J.Wen, M. Severa,W. Zeng, M. H. Luttrell, andW. Jin, "A format-compliant configurable encryption framework for access control of video," IEEE Trans. Circuits Syst. Video Technol., vol. 12, no. 6, pp. 545-557, 2002.
    • (2002) IEEE Trans. Circuits Syst. Video Technol. , vol.12 , Issue.6 , pp. 545-557
    • Wen, J.1    Severa, M.2    Zeng, W.3    Luttrell, M.H.4
  • 16
    • 0344395626 scopus 로고    scopus 로고
    • Key management and distribution for secure multimedia multicast
    • W. Trappe, J. Song, R. Poovendran, and K. J. R. Liu, "Key management and distribution for secure multimedia multicast," IEEE Trans.Multimedia, vol. 5, no. 4, pp. 544-557, 2003.
    • (2003) IEEE Trans.Multimedia , vol.5 , Issue.4 , pp. 544-557
    • Trappe, W.1    Song, J.2    Poovendran, R.3    Liu, K.J.R.4
  • 19
    • 0032095654 scopus 로고    scopus 로고
    • Multimedia dataembedding and watermarking technologies
    • M. D. Swanson, M. Kobayashi, and A. H. Tewfik, "Multimedia dataembedding and watermarking technologies," Proc. IEEE, vol. 86, no. 6, pp. 1064-1087, 1998.
    • (1998) Proc. IEEE , vol.86 , Issue.6 , pp. 1064-1087
    • Swanson, M.D.1    Kobayashi, M.2    Tewfik, A.H.3
  • 20
    • 0032680807 scopus 로고    scopus 로고
    • Information hiding - A survey
    • F. A. P. Petitcolas, R. J. Anderson, andM. G. Kuhn, "Information hiding - a survey," Proc. IEEE, vol. 87, no. 7, pp. 1062-1078, 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1062-1078
    • Petitcolas, F.A.P.1    Anderson, R.J.2    Kuhn, M.G.3
  • 21
    • 0032634857 scopus 로고    scopus 로고
    • Multimedia watermarking techniques
    • F. Hartung and M. Kutter, "Multimedia watermarking techniques," Proc. IEEE, vol. 87, no. 7, pp. 1079-1107, 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1079-1107
    • Hartung, F.1    Kutter, M.2
  • 24
    • 0032072279 scopus 로고    scopus 로고
    • Image-adaptive watermarking using visual models
    • C. I. Podilchuk and W. Zeng, "Image-adaptive watermarking using visual models," IEEE J. Select. Areas Commun., vol. 16, no. 4, pp. 525-539, 1998.
    • (1998) IEEE J. Select. Areas Commun. , vol.16 , Issue.4 , pp. 525-539
    • Podilchuk, C.I.1    Zeng, W.2
  • 25
    • 0000863143 scopus 로고    scopus 로고
    • Wavelet transform based watermark for digital images
    • X. G. Xia, C. G. Boncelet, and G. R. Arce, "Wavelet transform based watermark for digital images," Optics Express, vol. 3, no. 12, pp. 497-511, 1998.
    • (1998) Optics Express , vol.3 , Issue.12 , pp. 497-511
    • Xia, X.G.1    Boncelet, C.G.2    Arce, G.R.3
  • 27
    • 0033690185 scopus 로고    scopus 로고
    • A source and channel-coding framework for vector-based data hiding in video
    • D. Mukherjee, J. J. Chae, and S. K. Mitra, "A source and channel-coding framework for vector-based data hiding in video," IEEE Trans. Circuits Syst. Video Technol., vol. 10, no. 4, pp. 630-645, 2000.
    • (2000) IEEE Trans. Circuits Syst. Video Technol. , vol.10 , Issue.4 , pp. 630-645
    • Mukherjee, D.1    Chae, J.J.2    Mitra, S.K.3
  • 28
    • 0032664574 scopus 로고    scopus 로고
    • Perceptual watermarks for digital images and video
    • R. B. Wolfgang, C. I. Podilchuk, and E. J. Delp, "Perceptual watermarks for digital images and video," Proc. IEEE, vol. 87, no. 7, pp. 1108-1126, 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1108-1126
    • Wolfgang, R.B.1    Podilchuk, C.I.2    Delp, E.J.3
  • 36
    • 0001476552 scopus 로고    scopus 로고
    • A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images
    • W. Zeng and B. Liu, "A statistical watermark detection technique without using original images for resolving rightful ownerships of digital images," IEEE Trans. Image Processing, vol. 8, no. 11, pp. 1534-1548, 1999.
    • (1999) IEEE Trans. Image Processing , vol.8 , Issue.11 , pp. 1534-1548
    • Zeng, W.1    Liu, B.2
  • 38
    • 0037353686 scopus 로고    scopus 로고
    • Information-theoretic analysis of information hiding
    • P. Moulin and J. A. O'Sullivan, "Information-theoretic analysis of information hiding," IEEE Trans. Inform. Theory, vol. 49, no. 3, pp. 563-593, 2003.
    • (2003) IEEE Trans. Inform. Theory , vol.49 , Issue.3 , pp. 563-593
    • Moulin, P.1    O'Sullivan, J.A.2
  • 39
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • B. Chen and G. W. Wornell, "Quantization index modulation: a class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inform. Theory, vol. 47, no. 4, pp. 1423-1443, 2001.
    • (2001) IEEE Trans. Inform. Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 40
    • 0020752342 scopus 로고
    • Writing on dirty paper
    • M. H. M Costa, "Writing on dirty paper," IEEE Trans. Inform. Theory, vol. 29, no. 3, pp. 439-441, 1983.
    • (1983) IEEE Trans. Inform. Theory , vol.29 , Issue.3 , pp. 439-441
    • Costa, M.H.M.1
  • 45
    • 0004082156 scopus 로고    scopus 로고
    • McGraw-Hill, New York, NY, USA, 4th edition
    • J. G. Proakis, Digital Communications, McGraw-Hill, New York, NY, USA, 4th edition, 2000.
    • (2000) Digital Communications
    • Proakis, J.G.1
  • 48
    • 0003195355 scopus 로고    scopus 로고
    • Recovery of watermarks from distorted images
    • Hotel Elbflorenz, Dresden, Germany, September-October
    • N. F. Johnson, Z. Duric, and S. Jajodia, "Recovery of watermarks from distorted images," in Proc. 3rd Information Hiding Workshop (IHW '99), pp. 361-375, Hotel Elbflorenz, Dresden, Germany, September-October 1999.
    • (1999) Proc. 3rd Information Hiding Workshop (IHW '99) , pp. 361-375
    • Johnson, N.F.1    Duric, Z.2    Jajodia, S.3
  • 50
    • 85032751604 scopus 로고    scopus 로고
    • Collusion-resistant fingerprinting for multimedia
    • M. Wu, W. Trappe, Z. J. Wang, and K. J. R. Liu, "Collusion-resistant fingerprinting for multimedia," IEEE Signal Processing Mag., vol. 21, no. 2, pp. 15-27, 2004.
    • (2004) IEEE Signal Processing Mag. , vol.21 , Issue.2 , pp. 15-27
    • Wu, M.1    Trappe, W.2    Wang, Z.J.3    Liu, K.J.R.4
  • 51
    • 0035171717 scopus 로고    scopus 로고
    • A content dependent spatially localized video watermark for resistance to collusion and interpolation attacks
    • Thessaloniki, Greece, October
    • K. Su, D. Kundur, and D. Hatzinakos, "A content dependent spatially localized video watermark for resistance to collusion and interpolation attacks," in Proc. IEEE International Conference on Image Processing (ICIP '01), vol. 1, pp. 818-821, Thessaloniki, Greece, October 2001.
    • (2001) Proc. IEEE International Conference on Image Processing (ICIP '01) , vol.1 , pp. 818-821
    • Su, K.1    Kundur, D.2    Hatzinakos, D.3
  • 52
    • 0032070304 scopus 로고    scopus 로고
    • Multiresolution scene-based video watermarking using perceptual models
    • M. D. Swanson, B. Zhu, and A. H. Tewfik, "Multiresolution scene-based video watermarking using perceptual models," IEEE J. Select. Areas Commun., vol. 16, no. 4, pp. 540-550, 1998.
    • (1998) IEEE J. Select. Areas Commun. , vol.16 , Issue.4 , pp. 540-550
    • Swanson, M.D.1    Zhu, B.2    Tewfik, A.H.3
  • 53
    • 0038104797 scopus 로고    scopus 로고
    • Blind pattern matching attack on watermarking systems
    • D. Kirovski and F. A. P. Petitcolas, "Blind pattern matching attack on watermarking systems," IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 1045- 1053, 2003.
    • (2003) IEEE Trans. Signal Processing , vol.51 , Issue.4 , pp. 1045-1053
    • Kirovski, D.1    Petitcolas, F.A.P.2
  • 55
    • 0038156469 scopus 로고    scopus 로고
    • Data hiding in image and video. II. Designs and applications
    • M. Wu, H. Yu, and B. Liu, "Data hiding in image and video. II. Designs and applications," IEEE Trans. Image Processing, vol. 12, no. 6, pp. 696-705, 2003.
    • (2003) IEEE Trans. Image Processing , vol.12 , Issue.6 , pp. 696-705
    • Wu, M.1    Yu, H.2    Liu, B.3
  • 57
    • 0033882559 scopus 로고    scopus 로고
    • DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure
    • Special Issue on Image and Video Processing for Digital Libraries
    • J. R. Hernandez, M. Amado, and F. Perez-Gonzalez, "DCT-domain watermarking techniques for still images: detector performance analysis and a new structure," IEEE Trans. Image Processing, vol. 9, no. 1, pp. 55-68, 2000, Special Issue on Image and Video Processing for Digital Libraries.
    • (2000) IEEE Trans. Image Processing , vol.9 , Issue.1 , pp. 55-68
    • Hernandez, J.R.1    Amado, M.2    Perez-Gonzalez, F.3
  • 58
    • 20444373301 scopus 로고    scopus 로고
    • Anti-collusion forensics ofmultimedia fingerprinting using orthogonalmodulation
    • Z. J.Wang, M. Wu, H. Zhao, W. Trappe, and K. J. R. Liu, "Anti-collusion forensics ofmultimedia fingerprinting using orthogonalmodulation," IEEE Trans. Image Processing, vol. 14, no. 6, pp. 804-821, 2005.
    • (2005) IEEE Trans. Image Processing , vol.14 , Issue.6 , pp. 804-821
    • Wang, Z.J.1    Wu, M.2    Zhao, H.3    Trappe, W.4    Liu, K.J.R.5
  • 62
    • 0003538515 scopus 로고    scopus 로고
    • Analysis of attacks on image watermarks with randomized coefficients
    • NEC Research Institute, Princeton, NJ, USA
    • H. Stone, "Analysis of attacks on image watermarks with randomized coefficients," Tech. Rep. 96-045, NEC Research Institute, Princeton, NJ, USA, 1996.
    • (1996) Tech. Rep. 96-045
    • Stone, H.1
  • 67
    • 0026818192 scopus 로고
    • The JPEG still picture compression standard
    • G. K. Wallace, "The JPEG still picture compression standard," IEEE Trans. Consumer Electron., vol. 38, no. 1, pp. 18-34, 1992.
    • (1992) IEEE Trans. Consumer Electron. , vol.38 , Issue.1 , pp. 18-34
    • Wallace, G.K.1
  • 70
    • 0037796443 scopus 로고    scopus 로고
    • Resistance of digital watermarks to collusive attacks
    • Department of Computer Science, Princeton University, Princeton, NJ, USA
    • J. Kilian, F. T. Leighton, L. R. Matheson, T. G. Shamoon, R. Tajan, and F. Zane, "Resistance of digital watermarks to collusive attacks," Tech. Rep. TR- 585-98, Department of Computer Science, Princeton University, Princeton, NJ, USA, 1998.
    • (1998) Tech. Rep. TR-585-98
    • Kilian, J.1    Leighton, F.T.2    Matheson, L.R.3    Shamoon, T.G.4    Tajan, R.5    Zane, F.6
  • 71
    • 33645654061 scopus 로고    scopus 로고
    • Improving collusion resistance of error correcting code basedmultimedia fingerprinting
    • Philadelphia, Pa, USA, March
    • S. He and M. Wu, "Improving collusion resistance of error correcting code basedmultimedia fingerprinting," in Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '05), vol. 2, pp. 1029-1032, Philadelphia, Pa, USA, March 2005.
    • (2005) Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '05) , vol.2 , pp. 1029-1032
    • He, S.1    Wu, M.2
  • 74
    • 0003707560 scopus 로고
    • John Wiley & Sons, New York, NY, USA, 2nd edition
    • H. A. David, Order Statistics, John Wiley & Sons, New York, NY, USA, 2nd edition, 1981.
    • (1981) Order Statistics
    • David, H.A.1
  • 75
    • 0037823843 scopus 로고    scopus 로고
    • Adaptive quadrature - revisited
    • W. Gander andW. Gautschi, "Adaptive quadrature - revisited," BIT Numerical Mathematics, vol. 40, no. 1, pp. 84-101, 2000.
    • (2000) BIT Numerical Mathematics , vol.40 , Issue.1 , pp. 84-101
    • Gander, W.1    Gautschi, W.2
  • 76
    • 18844458745 scopus 로고    scopus 로고
    • Performance of detection statistics under collusion attacks on independent multimedia fingerprints
    • Baltimore, Md, USA, July
    • H. Zhao, M. Wu, Z. J.Wang, and K. J. R. Liu, "Performance of detection statistics under collusion attacks on independent multimedia fingerprints," in Proc. IEEE International Conference onMultimedia and Expo (ICME '03), vol. 1, pp. 205-208, Baltimore, Md, USA, July 2003.
    • (2003) Proc. IEEE International Conference OnMultimedia and Expo (ICME '03) , vol.1 , pp. 205-208
    • Zhao, H.1    Wu, M.2    Wang, Z.J.3    Liu, K.J.R.4
  • 77
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Trans. Inform. Theory, vol. 44, no. 5, pp. 1897-1905, 1998.
    • (1998) IEEE Trans. Inform. Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 79
    • 0038156437 scopus 로고    scopus 로고
    • Data hiding in image and video. I. Fundamental issues and solutions
    • M. Wu and B. Liu, "Data hiding in image and video. I. Fundamental issues and solutions," IEEE Trans. Image Processing, vol. 12, no. 6, pp. 685-695, 2003.
    • (2003) IEEE Trans. Image Processing , vol.12 , Issue.6 , pp. 685-695
    • Wu, M.1    Liu, B.2
  • 80
    • 0038527384 scopus 로고    scopus 로고
    • Anti-collusion fingerprinting for multimedia
    • Special Issue on Signal Processing for Data Hiding in Digital Media
    • W. Trappe,M.Wu, Z. J.Wang, and K. J. R. Liu, "Anti-collusion fingerprinting for multimedia," IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 1069- 1087, 2003, Special Issue on Signal Processing for Data Hiding in Digital Media.
    • (2003) IEEE Trans. Signal Processing , vol.51 , Issue.4 , pp. 1069-1087
    • Trappe, W.1    Wu, M.2    Wang, Z.J.3    Liu, K.J.R.4
  • 82
    • 18844450187 scopus 로고    scopus 로고
    • Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
    • H. Zhao, M. Wu, Z. J. Wang, and K. J. R. Liu, "Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting," IEEE Trans. Image Processing, vol. 14, no. 5, pp. 646-661, 2005.
    • (2005) IEEE Trans. Image Processing , vol.14 , Issue.5 , pp. 646-661
    • Zhao, H.1    Wu, M.2    Wang, Z.J.3    Liu, K.J.R.4
  • 87
    • 0028516487 scopus 로고
    • On competitive group testing
    • D.-Z. Du and H. Park, "On competitive group testing," SIAM Journal on Computing, vol. 23, no. 5, pp. 1019-1025, 1994.
    • (1994) SIAM Journal on Computing , vol.23 , Issue.5 , pp. 1019-1025
    • Du, D.-Z.1    Park, H.2
  • 89
    • 0003807773 scopus 로고    scopus 로고
    • Prentice Hall, Englewood Cliffs, NJ, USA
    • E. Lehmann, Adaptive Filter Theory, Prentice Hall, Englewood Cliffs, NJ, USA, 1996.
    • (1996) Adaptive Filter Theory
    • Lehmann, E.1
  • 96
  • 99
    • 0027542641 scopus 로고
    • Maximum likelihood parameter estimation of superimposed signals by dynamic programming
    • S. F. Yau and Y. Bresler, "Maximum likelihood parameter estimation of superimposed signals by dynamic programming," IEEE Trans. Signal Processing, vol. 41, no. 2, pp. 804-820, 1993.
    • (1993) IEEE Trans. Signal Processing , vol.41 , Issue.2 , pp. 804-820
    • Yau, S.F.1    Bresler, Y.2
  • 100
    • 0024089986 scopus 로고
    • Maximum likelihood localization of multiple sources by alternating projection
    • I. Ziskind and M. Wax, "Maximum likelihood localization of multiple sources by alternating projection," IEEE Trans. Acoust., Speech, Signal Processing, vol. 36, no. 10, pp. 1553-1560, 1988.
    • (1988) IEEE Trans. Acoust., Speech, Signal Processing , vol.36 , Issue.10 , pp. 1553-1560
    • Ziskind, I.1    Wax, M.2
  • 101
    • 0028540116 scopus 로고
    • A least-squares algorithm for multipath time-delay estimation
    • T. G. Manickam, R. J. Vaccaro, and D. W. Tufts, "A least-squares algorithm for multipath time-delay estimation," IEEE Trans. Signal Processing, vol. 42, no. 11, pp. 3229-3233, 1994.
    • (1994) IEEE Trans. Signal Processing , vol.42 , Issue.11 , pp. 3229-3233
    • Manickam, T.G.1    Vaccaro, R.J.2    Tufts, D.W.3
  • 104
    • 0031644084 scopus 로고    scopus 로고
    • The shortest vector problem in L2 is NP-Hard for randomized reductions
    • Dallas, Tex, USA, May
    • M. Ajtai, "The shortest vector problem in L2 is NP-Hard for randomized reductions," in Proc. 30th Annual ACM Symposium on Theory of Computing (STOC '98), pp. 10-19, Dallas, Tex, USA, May 1998.
    • (1998) Proc. 30th Annual ACM Symposium on Theory of Computing (STOC '98) , pp. 10-19
    • Ajtai, M.1
  • 105
    • 84966239268 scopus 로고
    • Improvedmethods for calculating vectors of short length in a lattice, including a complexity analysis
    • U. Fincke andM. Pohst, "Improvedmethods for calculating vectors of short length in a lattice, including a complexity analysis,"Mathematics of Computation, vol. 44, no. 4, pp. 463-471, 1985.
    • (1985) Mathematics of Computation , vol.44 , Issue.4 , pp. 463-471
    • Fincke, U.1    Pohst, M.2
  • 108
    • 77958563955 scopus 로고    scopus 로고
    • Fingerprint multicast in secure video streaming
    • to appear, Fall
    • H. Zhao and K. J. R. Liu, "Fingerprint multicast in secure video streaming," to appear in IEEE Trans. Image Processing, Fall 2005.
    • (2005) IEEE Trans. Image Processing
    • Zhao, H.1    Liu, K.J.R.2
  • 109
    • 0004198635 scopus 로고    scopus 로고
    • Prentice Hall PTR, Upper Saddle River, NJ, USA
    • C. Pfleeger, Security in Computing, Prentice Hall PTR, Upper Saddle River, NJ, USA, 1996.
    • (1996) Security in Computing
    • Pfleeger, C.1
  • 110
    • 0032075477 scopus 로고    scopus 로고
    • Some general methods for tampering with watermarks
    • I. J. Cox and J.-P. M. G. Linnartz, "Some general methods for tampering with watermarks," IEEE J. Select. Areas Commun., vol. 16, no. 4, pp. 587- 593, 1998.
    • (1998) IEEE J. Select. Areas Commun. , vol.16 , Issue.4 , pp. 587-593
    • Cox, I.J.1    Linnartz, J.-P.M.G.2
  • 113
    • 11144253373 scopus 로고    scopus 로고
    • Video fingerprinting and encryption principles for digital rights management
    • D. Kundur and K. Karthik, "Video fingerprinting and encryption principles for digital rights management," Proc. IEEE, vol. 92, no. 6, pp. 918-932, 2004.
    • (2004) Proc. IEEE , vol.92 , Issue.6 , pp. 918-932
    • Kundur, D.1    Karthik, K.2
  • 122
    • 84942242681 scopus 로고    scopus 로고
    • Communication-friendly encryption of multimedia
    • St. Thomas, Virgin Islands, USA, December
    • M. Wu and Y. Mao, "Communication-friendly encryption of multimedia," in IEEE Workshop on Multimedia Signal Processing (MMSP '02), pp. 292- 295, St. Thomas, Virgin Islands, USA, December 2002.
    • (2002) IEEE Workshop on Multimedia Signal Processing (MMSP '02) , pp. 292-295
    • Wu, M.1    Mao, Y.2
  • 124
    • 18144414571 scopus 로고    scopus 로고
    • A secure multicast scheme for anti-collusion fingerprinted video
    • Dallas, Tex, USA, November-December
    • H. Zhao and K. J. R. Liu, "A secure multicast scheme for anti-collusion fingerprinted video," in Proc. IEEE Global Telecommunications Conference (GLOBECOM '04), vol. 2, pp. 571-575, Dallas, Tex, USA, November- December 2004.
    • (2004) Proc. IEEE Global Telecommunications Conference (GLOBECOM '04) , vol.2 , pp. 571-575
    • Zhao, H.1    Liu, K.J.R.2
  • 125
    • 23044526820 scopus 로고    scopus 로고
    • Pricingmulticast communication: A costbased approach
    • J. C.-I. Chuang and M. A. Sirbu, "Pricingmulticast communication: A costbased approach," Telecommunication Systems, vol. 17, no. 3, pp. 281-297, 2001.
    • (2001) Telecommunication Systems , vol.17 , Issue.3 , pp. 281-297
    • Chuang, J.C.-I.1    Sirbu, M.A.2
  • 126
    • 0032072064 scopus 로고    scopus 로고
    • Watermarking of uncompressed and compressed video
    • F. Hartung and B. Girod, "Watermarking of uncompressed and compressed video," Signal Processing, vol. 66, no. 3, pp. 283-301, 1998.
    • (1998) Signal Processing , vol.66 , Issue.3 , pp. 283-301
    • Hartung, F.1    Girod, B.2
  • 129
    • 3042583370 scopus 로고    scopus 로고
    • Watermarking polygonal lines using Fourier descriptors
    • V. Solachidis and I. Pitas, "Watermarking polygonal lines using Fourier descriptors," IEEE Comput. Graph. Appl., vol. 24, no. 3, pp. 44-51, 2004.
    • (2004) IEEE Comput. Graph. Appl. , vol.24 , Issue.3 , pp. 44-51
    • Solachidis, V.1    Pitas, I.2
  • 130
  • 133
    • 3242759877 scopus 로고    scopus 로고
    • Data hiding in binary image for authentication and annotation
    • M. Wu and B. Liu, "Data hiding in binary image for authentication and annotation," IEEE Trans. Multimedia, vol. 6, no. 4, pp. 528-538, 2004.
    • (2004) IEEE Trans. Multimedia , vol.6 , Issue.4 , pp. 528-538
    • Wu, M.1    Liu, B.2
  • 134
    • 0000370347 scopus 로고
    • Video-steganography: How to secretly embed a signature in a picture
    • K. Matsui and K. Tanaka, "Video-steganography: how to secretly embed a signature in a picture," IMA Intellectual Property Project Proceedings, vol. 1, no. 1, pp. 187-205, 1994.
    • (1994) IMA Intellectual Property Project Proceedings , vol.1 , Issue.1 , pp. 187-205
    • Matsui, K.1    Tanaka, K.2
  • 136
    • 84947210322 scopus 로고    scopus 로고
    • A shape-preserving data embedding algorithm for NURBS curves and surfaces
    • Canmore, Canada, June
    • R. Ohbuchi, H. Masuda, and M. Aono, "A shape-preserving data embedding algorithm for NURBS curves and surfaces," in Proc. Computer Graphics International (CGI '99), pp. 180-188, Canmore, Canada, June 1999.
    • (1999) Proc. Computer Graphics International (CGI '99) , pp. 180-188
    • Ohbuchi, R.1    Masuda, H.2    Aono, M.3
  • 138
  • 141
    • 20444477579 scopus 로고    scopus 로고
    • Data hiding in curves for collusion-resistant digital fingerprinting
    • Singapore, October
    • H. Gou and M. Wu, "Data hiding in curves for collusion-resistant digital fingerprinting," in Proc. IEEE International Conference on Image Processing (ICIP '04), vol. 1, pp. 51-54, Singapore, October 2004.
    • (2004) Proc. IEEE International Conference on Image Processing (ICIP '04) , vol.1 , pp. 51-54
    • Gou, H.1    Wu, M.2
  • 145
    • 0038715134 scopus 로고    scopus 로고
    • Multimedia content screening using a dual watermarking and fingerprinting system
    • Juan Les Pins, France, December
    • D. Kirovski, H. S. Malvar, and Y. Yacobi, "Multimedia content screening using a dual watermarking and fingerprinting system," in Proc. ACM Multimedia, pp. 372-381, Juan Les Pins, France, December 2002.
    • (2002) Proc. ACM Multimedia , pp. 372-381
    • Kirovski, D.1    Malvar, H.S.2    Yacobi, Y.3
  • 146
    • 0030269660 scopus 로고    scopus 로고
    • Affine-invariant B-spline moments for curve matching
    • Z. Huang and F. S. Cohen, "Affine-invariant B-spline moments for curve matching," IEEE Trans. Image Processing, vol. 5, no. 10, pp. 1473-1480, 1996.
    • (1996) IEEE Trans. Image Processing , vol.5 , Issue.10 , pp. 1473-1480
    • Huang, Z.1    Cohen, F.S.2
  • 148
    • 0004027284 scopus 로고
    • John Wiley & Sons, New York, NY, USA, 2nd edition
    • H. S. M. Coxeter, Introduction to Geometry, John Wiley & Sons, New York, NY, USA, 2nd edition, 1969.
    • (1969) Introduction to Geometry
    • Coxeter, H.S.M.1
  • 149
    • 0028336090 scopus 로고
    • Part I: Modeling image curves using invariant 3-D object curve models - A path to 3-D recognition and shape estimation from image contours
    • F. S. Cohen and J.-Y. Wang, "Part I: Modeling image curves using invariant 3-D object curve models-a path to 3-D recognition and shape estimation from image contours," IEEE Trans. Pattern Anal. Machine Intell., vol. 16, no. 1, pp. 1-12, 1994.
    • (1994) IEEE Trans. Pattern Anal. Machine Intell. , vol.16 , Issue.1 , pp. 1-12
    • Cohen, F.S.1    Wang, J.-Y.2
  • 151
    • 2442558011 scopus 로고    scopus 로고
    • Image registration by "super-curves
    • M. Xia and B. Liu, "Image registration by "Super-curves", " IEEE Trans. Image Processing, vol. 13, no. 5, pp. 720-732, 2004.
    • (2004) IEEE Trans. Image Processing , vol.13 , Issue.5 , pp. 720-732
    • Xia, M.1    Liu, B.2
  • 152
    • 0042878478 scopus 로고    scopus 로고
    • Multicast over wireless networks
    • U. Varshney, "Multicast over wireless networks," Communications of the ACM, vol. 45, no. 12, pp. 31-37, 2002.
    • (2002) Communications of the ACM , vol.45 , Issue.12 , pp. 31-37
    • Varshney, U.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.