메뉴 건너뛰기




Volumn , Issue , 2004, Pages 577-603

Digital media fingerprinting: Techniques and trends

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84898137322     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1201/9781420038262     Document Type: Chapter
Times cited : (9)

References (26)
  • 3
    • 0032162672 scopus 로고    scopus 로고
    • Collusion-secure fingerprinting for digital data
    • Boneh, D. and Shaw, J., Collusion-secure fingerprinting for digital data, IEEE Trans.Inf. Theory, 44, 1897, 1998.
    • (1998) IEEE Trans.Inf. Theory , vol.44 , pp. 1897
    • Boneh, D.1    Shaw, J.2
  • 6
    • 0036293565 scopus 로고    scopus 로고
    • presented at IEEE International Conference on Acoustics, Speech, and Signal Processing (ICAPSS '02), Orlando, FL
    • Trappe, W., Wu, M., and Liu, K. J. R., Collusion-resistant fingerprinting for multimedia, presented at IEEE International Conference on Acoustics, Speech, and Signal Processing (ICAPSS '02), Orlando, FL, 2002, Vol. 4, p. 3309.
    • (2002) Collusion-resistant fingerprinting for multimedia , vol.4 , pp. 3309
    • Trappe, W.1    Wu, M.2    Liu, K.J.R.3
  • 9
    • 34047228408 scopus 로고    scopus 로고
    • Nonlinear Collusion Attacks on Independent Fingerprints for Multimedia
    • Speech, and Signal Processing (ICASSP '03), Hong Kong
    • Zhao, H., Wu, M., Wang, Z. J., and Liu K. J. R., Nonlinear Collusion Attacks on Independent Fingerprints for Multimedia, in Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '03), Hong Kong, 2003.
    • (2003) Proceedings of IEEE International Conference on Acoustics
    • Zhao, H.1    Wu, M.2    Wang, Z.J.3    Liu, K.J.R.4
  • 11
    • 84957353052 scopus 로고    scopus 로고
    • Anonymous Fingerprinting
    • International Conference on the Theory and Application of Cryptographic Techniques, Fumy, W., Ed., Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • Pfitzmann, B. and Waidner, M., Anonymous Fingerprinting, in Advances in cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Fumy, W., Ed., Lecture Notes in Computer Science, Vol. 1233, Springer-Verlag, Berlin, 1997, p. 88.
    • (1997) Advances in cryptology - EUROCRYPT '97 , vol.1233 , pp. 88
    • Pfitzmann, B.1    Waidner, M.2
  • 13
    • 84957663275 scopus 로고    scopus 로고
    • Watercasting: Distributed watermarking of multicast media
    • Risa, L. and Fdida, S., Eds., Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • Brown, I., Perkins, C., and Crowcroft, J., Watercasting: Distributed watermarking of multicast media, in First International Workshop on Networked Group Communication '99, Risa, L. and Fdida, S., Eds., Lecture Notes in Computer Science, Vol. 1736, Springer-Verlag, Berlin, 1999, p. 286.
    • (1999) First International Workshop on Networked Group Communication '99 , vol.1736 , pp. 286
    • Brown, I.1    Perkins, C.2    Crowcroft, J.3
  • 14
    • 0037151693 scopus 로고    scopus 로고
    • WHIM: Watermarking multicast video with a hierarchy of intermediaries
    • Judge, P. and Ammar, M., WHIM: Watermarking multicast video with a hierarchy of intermediaries, IEEE Commn. Mag., 39, 699, 2002.
    • (2002) IEEE Commn. Mag. , vol.39 , pp. 699
    • Judge, P.1    Ammar, M.2
  • 17
    • 84959043688 scopus 로고    scopus 로고
    • Collusion secure q-ary fingerprinting for perceptual content
    • Sander, T., Ed., Lecture Notes in Computer Science, Springer-Verlag, Berlin
    • Safavi-Naini, R. and Wang, Y., Collusion secure q-ary fingerprinting for perceptual content, in Security and Privacy in Digital Rights Management ACM CCS-8 Workshop DRM 2001, Sander, T., Ed., Lecture Notes in Computer Science, Vol. 2320, Springer-Verlag, Berlin, 2002, p. 57.
    • (2002) Security and Privacy in Digital Rights Management ACM CCS-8 Workshop DRM 2001 , vol.2320 , pp. 57
    • Safavi-Naini, R.1    Wang, Y.2
  • 18
    • 0036028058 scopus 로고    scopus 로고
    • Cryptographic methods for collusion-secure fingerprinting of digital data
    • Biehl, I. and Mayer, B., Cryptographic methods for collusion-secure fingerprinting of digital data, Computers Electr. Eng., 28, 59, 2002.
    • (2002) Computers Electr. Eng. , vol.28 , pp. 59
    • Biehl, I.1    Mayer, B.2
  • 25
    • 0032072279 scopus 로고    scopus 로고
    • Image adaptive watermarking using visual models
    • Podilchuk, C. and Zeng, W., Image adaptive watermarking using visual models, IEEE J. Selected Areas Commn., 16, 525, 1998.
    • (1998) IEEE J. Selected Areas Commn. , vol.16 , pp. 525
    • Podilchuk, C.1    Zeng, W.2
  • 26
    • 84947921901 scopus 로고    scopus 로고
    • Chameleon - A new kind of stream cipher
    • Biham, E., Ed., Lecture Notes in Computer Science, Springer-Verlag
    • Anderson, R. and Manifavas, C., Chameleon - A new kind of stream cipher, in Fast Software Encryption 4th International Workshop, Biham, E., Ed., Lecture Notes in Computer Science, Vol. 1267, Springer-Verlag, 1997, p. 107.
    • (1997) Fast Software Encryption 4th International Workshop , vol.1267 , pp. 107
    • Anderson, R.1    Manifavas, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.