메뉴 건너뛰기




Volumn 54, Issue 3, 2013, Pages 315-331

A new fingerprinting scheme using social network analysis for majority attack

Author keywords

Collusion attack; Fingerprinting; Social network; Watermarking

Indexed keywords

CODES (SYMBOLS); DIGITAL WATERMARKING; SOCIAL NETWORKING (ONLINE);

EID: 84888001672     PISSN: 10184864     EISSN: 15729451     Source Type: Journal    
DOI: 10.1007/s11235-013-9736-8     Document Type: Article
Times cited : (14)

References (56)
  • 1
    • 20744446893 scopus 로고    scopus 로고
    • Advances in digital video content protection
    • 10.1109/JPROC.2004.839623
    • Lin, E. T., Eskicioglu, A. M., & Lagendijk, R. L. (2005). Advances in digital video content protection. Proceedings of the IEEE, 93(1), 171-183.
    • (2005) Proceedings of the IEEE , vol.93 , Issue.1 , pp. 171-183
    • Lin, E.T.1    Eskicioglu, A.M.2    Lagendijk, R.L.3
  • 2
    • 77955305045 scopus 로고    scopus 로고
    • Requirements for enforcing digital rights management in multicast content distribution
    • 10.1007/s11235-009-9231-4
    • Barhoush, M., & William Atwood, J. (2010). Requirements for enforcing digital rights management in multicast content distribution. Telecommunications Systems, 45(1), 3-20.
    • (2010) Telecommunications Systems , vol.45 , Issue.1 , pp. 3-20
    • Barhoush, M.1    William Atwood, J.2
  • 3
    • 0034249821 scopus 로고    scopus 로고
    • Partial encryption of compressed images and videos
    • 10.1109/78.852023
    • Cheng, H., & Li, X. B. (2000). Partial encryption of compressed images and videos. IEEE Transactions on Signal Processing, 48(8), 2439-2451.
    • (2000) IEEE Transactions on Signal Processing , vol.48 , Issue.8 , pp. 2439-2451
    • Cheng, H.1    Li, X.B.2
  • 4
    • 16344371432 scopus 로고    scopus 로고
    • Security analysis of a chaos-based image encryption algorithm
    • 10.1016/j.physa.2005.01.001
    • Lian, S. G., Sun, J. S., & Wang, Z. Q. (2005). Security analysis of a chaos-based image encryption algorithm. Physica A, 351(2-4), 645-661.
    • (2005) Physica A , vol.351 , Issue.2-4 , pp. 645-661
    • Lian, S.G.1    Sun, J.S.2    Wang, Z.Q.3
  • 5
    • 77954887026 scopus 로고    scopus 로고
    • Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems
    • 10.1007/s11235-009-9264-8
    • Lee, D. G., Kim, J., Sung, J., et al. (2010). Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems. Telecommunications Systems, 45(3-4), 267-279.
    • (2010) Telecommunications Systems , vol.45 , Issue.3-4 , pp. 267-279
    • Lee, D.G.1    Kim, J.2    Sung, J.3
  • 6
    • 77955920069 scopus 로고    scopus 로고
    • A new chaos-based fast image encryption algorithm
    • 10.1016/j.asoc.2009.12.011
    • Wang, Y., Wong, K. W., Liao, X. F., et al. (2011). A new chaos-based fast image encryption algorithm. Applied Soft Computing, 11(1), 514-522.
    • (2011) Applied Soft Computing , vol.11 , Issue.1 , pp. 514-522
    • Wang, Y.1    Wong, K.W.2    Liao, X.F.3
  • 7
    • 67349203285 scopus 로고    scopus 로고
    • On the security defects of an image encryption scheme
    • 10.1016/j.imavis.2008.12.008
    • Li, C. Q., Li, S. J., Asim, M., et al. (2009). On the security defects of an image encryption scheme. Image and Vision Computing, 27(9), 1371-1381.
    • (2009) Image and Vision Computing , vol.27 , Issue.9 , pp. 1371-1381
    • Li, C.Q.1    Li, S.J.2    Asim, M.3
  • 9
    • 0037372152 scopus 로고    scopus 로고
    • Content-based image copy detection
    • 10.1016/S0923-5965(02)00130-3
    • Kim, C. (2003). Content-based image copy detection. Signal Processing. Image Communication, 18(3), 169-184.
    • (2003) Signal Processing. Image Communication , vol.18 , Issue.3 , pp. 169-184
    • Kim, C.1
  • 10
    • 34248561901 scopus 로고    scopus 로고
    • Novel image copy detection with rotating tolerance
    • 10.1016/j.jss.2006.12.001
    • Wub, M.-N., Linc, C.-C., & Chen, C. (2007). Novel image copy detection with rotating tolerance. The Journal of Systems and Software, 80(7), 1057-1069.
    • (2007) The Journal of Systems and Software , vol.80 , Issue.7 , pp. 1057-1069
    • Wub, M.-N.1    Linc, C.-C.2    Chen, C.3
  • 11
    • 77952256823 scopus 로고    scopus 로고
    • An image-based approach to video copy detection with spatio-temporal post-filtering
    • 10.1109/TMM.2010.2046265
    • Douze, M., Jegou, H., & Schmid, C. (2010). An image-based approach to video copy detection with spatio-temporal post-filtering. IEEE Transactions on Multimedia, 12(4), 257-266.
    • (2010) IEEE Transactions on Multimedia , vol.12 , Issue.4 , pp. 257-266
    • Douze, M.1    Jegou, H.2    Schmid, C.3
  • 12
    • 79953029487 scopus 로고    scopus 로고
    • A novel image copy detection scheme based on the local multi-resolution histogram descriptor
    • 10.1007/s11042-009-0438-x
    • Xu, Z., Ling, H., Zou, F., et al. (2011). A novel image copy detection scheme based on the local multi-resolution histogram descriptor. Multimedia Tools and Applications, 52(2), 445-463.
    • (2011) Multimedia Tools and Applications , vol.52 , Issue.2 , pp. 445-463
    • Xu, Z.1    Ling, H.2    Zou, F.3
  • 13
    • 79953029604 scopus 로고    scopus 로고
    • Fine-search for image copy detection based on local affine-invariant descriptor and spatial dependent matching
    • 10.1007/s11042-009-0439-9
    • Ling, H., Wang, L., Zou, F., et al. (2011). Fine-search for image copy detection based on local affine-invariant descriptor and spatial dependent matching. Multimedia Tools and Applications, 52(2), 551-568.
    • (2011) Multimedia Tools and Applications , vol.52 , Issue.2 , pp. 551-568
    • Ling, H.1    Wang, L.2    Zou, F.3
  • 15
    • 34547747797 scopus 로고    scopus 로고
    • A new approach to image copy detection based on extended feature sets
    • 10.1109/TIP.2007.900099
    • Hsiao, J. H., Chen, C. S., Chien, L. F., & Chen, M. S. (2007). A new approach to image copy detection based on extended feature sets. IEEE Transactions on Image Processing, 16(8), 2069-2079.
    • (2007) IEEE Transactions on Image Processing , vol.16 , Issue.8 , pp. 2069-2079
    • Hsiao, J.H.1    Chen, C.S.2    Chien, L.F.3    Chen, M.S.4
  • 18
    • 0031362116 scopus 로고    scopus 로고
    • Secure spread spectrum watermarking for multimedia
    • 10.1109/83.650120
    • Cox, I. J., Kilian, J., Leighton, F. T., et al. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12), 1673-1687.
    • (1997) IEEE Transactions on Image Processing , vol.6 , Issue.12 , pp. 1673-1687
    • Cox, I.J.1    Kilian, J.2    Leighton, F.T.3
  • 19
    • 77954888215 scopus 로고    scopus 로고
    • Localized affine transform resistant watermarking in region-of-interest
    • 10.1007/s11235-009-9260-z
    • Zhang, L., & Zhou, P.-P. (2010). Localized affine transform resistant watermarking in region-of-interest. Telecommunications Systems, 45(3-4), 205-220.
    • (2010) Telecommunications Systems , vol.45 , Issue.3-4 , pp. 205-220
    • Zhang, L.1    Zhou, P.-P.2
  • 20
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • 10.1109/18.705568
    • Boneh, D., & Shaw, J. (1998). Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44(5), 1897-1905.
    • (1998) IEEE Transactions on Information Theory , vol.44 , Issue.5 , pp. 1897-1905
    • Boneh, D.1    Shaw, J.2
  • 21
    • 44649098085 scopus 로고    scopus 로고
    • A review on blind detection for image steganography
    • 10.1016/j.sigpro.2008.03.016
    • Luo, X. Y., Wang, D. S., Wang, P., et al. (2008). A review on blind detection for image steganography. Signal Processing, 88(9), 2138-2157.
    • (2008) Signal Processing , vol.88 , Issue.9 , pp. 2138-2157
    • Luo, X.Y.1    Wang, D.S.2    Wang, P.3
  • 22
    • 0037399342 scopus 로고    scopus 로고
    • Digital fingerprinting codes: Problem statements, constructions, identification of traitors
    • 10.1109/TIT.2003.809570
    • Barg, A., Blakley, G., & Kabatiansky, G. (2003). Digital fingerprinting codes: problem statements, constructions, identification of traitors. IEEE Transactions on Information Theory, 49, 852-865.
    • (2003) IEEE Transactions on Information Theory , vol.49 , pp. 852-865
    • Barg, A.1    Blakley, G.2    Kabatiansky, G.3
  • 23
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • 10.1109/18.705568
    • Boneh, D., & Shaw, J. (1998). Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory, 44, 1987-1995.
    • (1998) IEEE Transactions on Information Theory , vol.44 , pp. 1987-1995
    • Boneh, D.1    Shaw, J.2
  • 24
    • 33745654095 scopus 로고    scopus 로고
    • A short random fingerprinting code against a small number of pirates
    • LNCS 3857 Springer Berlin
    • Hagiwara, M., Hanaoka, G., & Imai, H. (2006). A short random fingerprinting code against a small number of pirates. In LNCS: Vol. 3857. Proc. of AAECC 2006 (pp. 193-202). Berlin: Springer.
    • (2006) Proc. of AAECC 2006 , pp. 193-202
    • Hagiwara, M.1    Hanaoka, G.2    Imai, H.3
  • 28
    • 70450247410 scopus 로고    scopus 로고
    • Behavior forensics with side information for multimedia fingerprinting social network
    • 10.1109/TIFS.2009.2033224
    • Lin, W. S., Zhao, H. V., & Liu, K. J. R. (2009). Behavior forensics with side information for multimedia fingerprinting social network. IEEE Transactions on Information Forensics and Security, 4(4), 911-927.
    • (2009) IEEE Transactions on Information Forensics and Security , vol.4 , Issue.4 , pp. 911-927
    • Lin, W.S.1    Zhao, H.V.2    Liu, K.J.R.3
  • 30
    • 85032751193 scopus 로고    scopus 로고
    • Behavior modeling and forensics for multimedia social networks: A case study in multimedia fingerprinting
    • 10.1109/MSP.2008.930648
    • Lin, W. S., Zhao, H. V., & Liu, K. J. R. (2009). Behavior modeling and forensics for multimedia social networks: a case study in multimedia fingerprinting. IEEE Signal Processing Magazine, 26(1), 118-139.
    • (2009) IEEE Signal Processing Magazine , vol.26 , Issue.1 , pp. 118-139
    • Lin, W.S.1    Zhao, H.V.2    Liu, K.J.R.3
  • 34
    • 69749127977 scopus 로고    scopus 로고
    • Robust MC-CDMA-based fingerprinting against time-varying collusion attacks
    • 10.1109/TIFS.2009.2025849
    • Cha, B. H., & Kuo, C. C. J. (2009). Robust MC-CDMA-based fingerprinting against time-varying collusion attacks. IEEE Transactions on Information Forensics and Security, 4(3), 302-317.
    • (2009) IEEE Transactions on Information Forensics and Security , vol.4 , Issue.3 , pp. 302-317
    • Cha, B.H.1    Kuo, C.C.J.2
  • 36
    • 18844450187 scopus 로고    scopus 로고
    • Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
    • 10.1109/TIP.2005.846035
    • Zhao, H. V., Wu, M., Wang, Z. J., et al. (2005). Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. IEEE Transactions on Image Processing, 14(5), 646-661.
    • (2005) IEEE Transactions on Image Processing , vol.14 , Issue.5 , pp. 646-661
    • Zhao, H.V.1    Wu, M.2    Wang, Z.J.3
  • 37
    • 22144450367 scopus 로고    scopus 로고
    • New paradigms for effective multicasting and fingerprinting of entertainment media
    • Luh, W., & Kundur, D. (2005). New paradigms for effective multicasting and fingerprinting of entertainment media. IEEE Communications Magazine, 77(84).
    • (2005) IEEE Communications Magazine , vol.77 , Issue.84
    • Luh, W.1    Kundur, D.2
  • 38
    • 84985922619 scopus 로고
    • Tracing traitors
    • LNCS 839 Springer Berlin
    • Chor, et al. (1994). Tracing traitors. In LNCS: Vol. 839. Advances in cryptology-Crypto'94 (pp. 480-491). Berlin: Springer.
    • (1994) Advances in cryptology-Crypto'94 , pp. 480-491
    • Chor1
  • 40
    • 77955307807 scopus 로고    scopus 로고
    • Traitor tracing over YouTube video service-proof of concept
    • 10.1007/s11235-009-9236-z
    • Tomas-Buliart, J., Fernandez, M., & Soriano, M. (2010). Traitor tracing over YouTube video service-proof of concept. Telecommunications Systems, 45(1), 47-60.
    • (2010) Telecommunications Systems , vol.45 , Issue.1 , pp. 47-60
    • Tomas-Buliart, J.1    Fernandez, M.2    Soriano, M.3
  • 41
    • 33746989201 scopus 로고    scopus 로고
    • Secure advanced video coding based on selective encryption algorithms
    • 10.1109/TCE.2006.1649688
    • Lian, S. G., Liu, Z. X., Ren, Z., et al. (2006). Secure advanced video coding based on selective encryption algorithms. IEEE Transactions on Consumer Electronics, 52(2), 621-629.
    • (2006) IEEE Transactions on Consumer Electronics , vol.52 , Issue.2 , pp. 621-629
    • Lian, S.G.1    Liu, Z.X.2    Ren, Z.3
  • 42
    • 34250017964 scopus 로고    scopus 로고
    • Commutative encryption and watermarking in video compression
    • 10.1109/TCSVT.2007.896635
    • Lian, S. G., et al. (2007). Commutative encryption and watermarking in video compression. IEEE Transactions on Circuits and Systems for Video Technology, 17(6), 774-778.
    • (2007) IEEE Transactions on Circuits and Systems for Video Technology , vol.17 , Issue.6 , pp. 774-778
    • Lian, S.G.1
  • 43
    • 67349286030 scopus 로고    scopus 로고
    • Efficient image or video encryption based on spatiotemporal chaos system
    • 10.1016/j.chaos.2007.10.054
    • Lian, S. G. (2009). Efficient image or video encryption based on spatiotemporal chaos system. Chaos, Solitons and Fractals, 40(5), 2509-2519.
    • (2009) Chaos, Solitons and Fractals , vol.40 , Issue.5 , pp. 2509-2519
    • Lian, S.G.1
  • 44
    • 78149281534 scopus 로고    scopus 로고
    • Content and service protection for the ubiquitous TV based on network convergence
    • 10.1007/s11277-009-9783-3
    • Lian, S. G. (2010). Content and service protection for the ubiquitous TV based on network convergence. Wireless Personal Communications, 55(1), 19-34.
    • (2010) Wireless Personal Communications , vol.55 , Issue.1 , pp. 19-34
    • Lian, S.G.1
  • 45
    • 55149105649 scopus 로고    scopus 로고
    • Collusion-traceable secure multimedia distribution based on controllable modulation
    • 10.1109/TCSVT.2008.2002829
    • Lian, S. G., & Wang, Z. Q. (2008). Collusion-traceable secure multimedia distribution based on controllable modulation. IEEE Transactions on Circuits and Systems for Video Technology, 18(10), 1462-1467.
    • (2008) IEEE Transactions on Circuits and Systems for Video Technology , vol.18 , Issue.10 , pp. 1462-1467
    • Lian, S.G.1    Wang, Z.Q.2
  • 46
    • 48749117940 scopus 로고    scopus 로고
    • Secure media content distribution based on the improved set-top box in IPTV
    • 10.1109/TCE.2008.4560130
    • Lian, S. G., & Liu, Z. X. (2008). Secure media content distribution based on the improved set-top box in IPTV. IEEE Transactions on Consumer Electronics, 54(2), 560-566.
    • (2008) IEEE Transactions on Consumer Electronics , vol.54 , Issue.2 , pp. 560-566
    • Lian, S.G.1    Liu, Z.X.2
  • 47
    • 69749117797 scopus 로고    scopus 로고
    • Secure video distribution scheme based on partial encryption
    • 10.1002/ima.20199
    • Lian, S. G. (2009). Secure video distribution scheme based on partial encryption. International Journal of Imaging Systems and Technology, 19(3), 227-235.
    • (2009) International Journal of Imaging Systems and Technology , vol.19 , Issue.3 , pp. 227-235
    • Lian, S.G.1
  • 48
    • 70350168767 scopus 로고    scopus 로고
    • Secure image distribution based on joint decryption and fingerprinting
    • 10.1179/174313109X373693
    • Lian, S. G. (2009). Secure image distribution based on joint decryption and fingerprinting. Imaging Science Journal, 57(2), 84-93.
    • (2009) Imaging Science Journal , vol.57 , Issue.2 , pp. 84-93
    • Lian, S.G.1
  • 49
    • 63449123596 scopus 로고    scopus 로고
    • Quasi-commutative watermarking and encryption for secure media content distribution
    • 10.1007/s11042-008-0258-4
    • Lian, S. G. (2009). Quasi-commutative watermarking and encryption for secure media content distribution. Multimedia Tools and Applications, 43(1), 91-107.
    • (2009) Multimedia Tools and Applications , vol.43 , Issue.1 , pp. 91-107
    • Lian, S.G.1
  • 50
    • 78049458157 scopus 로고    scopus 로고
    • Bandwidth-effective streaming of educational medical videos
    • 10.1007/s00530-010-0183-z
    • Kantarci, A. (2010). Bandwidth-effective streaming of educational medical videos. Multimedia Systems, 16(6), 381-397.
    • (2010) Multimedia Systems , vol.16 , Issue.6 , pp. 381-397
    • Kantarci, A.1
  • 51
    • 30144437180 scopus 로고    scopus 로고
    • Fingerprint multicast in secure video streaming
    • 10.1109/TIP.2005.860356
    • Zhao, H. V., & Liu, K. J. R. (2006). Fingerprint multicast in secure video streaming. IEEE Transactions on Image Processing, 15(1), 12-29.
    • (2006) IEEE Transactions on Image Processing , vol.15 , Issue.1 , pp. 12-29
    • Zhao, H.V.1    Liu, K.J.R.2
  • 52
    • 77951203856 scopus 로고    scopus 로고
    • Detecting community structure in complex networks via node similarity
    • 10.1016/j.physa.2010.03.006
    • Pan, Y., Li, D.-H., Liu, J.-G., et al. (2010). Detecting community structure in complex networks via node similarity. Physica. A, 389, 2849-2857.
    • (2010) Physica. A , vol.389 , pp. 2849-2857
    • Pan, Y.1    Li, D.-H.2    Liu, J.-G.3
  • 53
    • 33744751840 scopus 로고    scopus 로고
    • The Boneh-Shaw fingerprinting scheme is better than we thought
    • 10.1109/TIFS.2006.873596
    • Schaathun, H. G. (2006). The Boneh-Shaw fingerprinting scheme is better than we thought. IEEE Transactions on Information Forensics and Security, 1(2), 248-255.
    • (2006) IEEE Transactions on Information Forensics and Security , vol.1 , Issue.2 , pp. 248-255
    • Schaathun, H.G.1
  • 54
    • 43949123848 scopus 로고    scopus 로고
    • Optimal probabilistic fingerprint codes
    • 10.1145/1346330.1346335
    • Tardos, G. (2008). Optimal probabilistic fingerprint codes. Journal of the ACM, 55(2), 1-24.
    • (2008) Journal of the ACM , vol.55 , Issue.2 , pp. 1-24
    • Tardos, G.1
  • 56
    • 59449103335 scopus 로고    scopus 로고
    • Detect overlapping and hierarchical community structure in networks
    • 10.1016/j.physa.2008.12.021
    • Shen, H., Cheng, X., Cai, K., & Hu, M.-b. (2009). Detect overlapping and hierarchical community structure in networks. Physica. A, 388(8), 1706-1712.
    • (2009) Physica. A , vol.388 , Issue.8 , pp. 1706-1712
    • Shen, H.1    Cheng, X.2    Cai, K.3    Hu, M.-B.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.