-
1
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
D. Boneh and J. Shaw, "Collusion-Secure Fingerprinting for Digital Data", IEEE Trans, on Information Theory, Vol. 44, pp. 1897-1905, 1998.
-
(1998)
IEEE Trans, on Information Theory
, vol.44
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
3
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. Cox, J. Kilian, F. Leighton, and T. Shamoon, "Secure Spread Spectrum Watermarking for Multimedia", IEEE Trans, on Image Proc., vol. 6, no. 12, pp. 1673-87, 1997.
-
(1997)
IEEE Trans, on Image Proc.
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, F.3
Shamoon, T.4
-
4
-
-
84957610906
-
A note on the limits of collusion-resistant watermarks
-
F. Ergun, J. Kilian and R. Kumar, "A Note on the limits of Collusion-Resistant Watermarks", in Eurocrypt'99, pp. 140-49, 1999.
-
(1999)
Eurocrypt'99
, pp. 140-149
-
-
Ergun, F.1
Kilian, J.2
Kumar, R.3
-
5
-
-
0032634857
-
Multimedia watermarking techniqures
-
July
-
F. Hartung and M. Kutter, "Multimedia Watermarking Techniqures", Pro. of IEEE, Vol. 87, pp. 1079-1107, July 1999.
-
(1999)
Pro. of IEEE
, vol.87
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
6
-
-
84890411878
-
Resistance of digital watermarks to collusive attacks
-
Proc, Aug
-
J. Kilian, T. Leighton, L. Matheson, T. Shamoon, R. Tarjan, and F. Zane, "Resistance of Digital Watermarks to Collusive Attacks", Proc. IEEE International Symposium on Information Theory, pp. 271, Aug. 1998.
-
(1998)
IEEE International Symposium on Information Theory
, pp. 271
-
-
Kilian, J.1
Leighton, T.2
Matheson, L.3
Shamoon, T.4
Tarjan, R.5
Zane, F.6
-
7
-
-
0141804694
-
Capacity of digital watermarks subjected to an optimal collusion attack
-
Sep
-
J, Su, J. Eggers, and B. Girod, "Capacity of Digital Watermarks Subjected to An Optimal Collusion Attack", Pro. Ell- SIPCO 2000, Vol. 4, Sep. 2000.
-
(2000)
Pro. Ell- SIPCO 2000
, vol.4
-
-
Eggers, J.1
Girod, B.2
Su, J.3
-
8
-
-
0003538515
-
Analysis of attacks on image watermarks with randomized coefficients
-
Princeton, NJ
-
H. Stone, "Analysis of Attacks on Image Watermarks with Randomized Coefficients", Tech. Rep. 96-045, NEC Research Institute, Princeton, NJ, 1996.
-
(1996)
Tech. Rep. 96-045, NEC Research Institute
-
-
Stone, H.1
-
9
-
-
0038527384
-
Anti- Collusion fingerprinting for multimedia
-
Feb
-
W. Trappe, M. Wu, Z. Jane Wang and K. J. R. Liu, "Anti- Collusion Fingerprinting for Multimedia", to appear IEEE Trans, on Signal Processing, Special issue on Signal Processing for Data Hiding in Digital Media & Secure Content Delivery, Feb. 2003.
-
(2003)
IEEE Trans, on Signal Processing, Special Issue on Signal Processing for Data Hiding in Digital Media & Secure Content Delivery
-
-
Trappe, W.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
10
-
-
84937541590
-
Improved boneh-shaw content fingerprinting
-
LNCS 2020, Springer-Verlag Berlin Heidelberg, 2001
-
Y. Yacobi, "Improved Boneh-Shaw Content Fingerprinting", CT-RSA 2001, LNCS 2020, pp. 378-91, Springer-Verlag Berlin Heidelberg, 2001.
-
(2001)
CT-RSA
, pp. 378-391
-
-
Yacobi, Y.1
-
11
-
-
84908488600
-
Collusion resistance of multimedia fingerprinting using orthogonal modulation
-
Nov
-
Z. Jane Wang, M. Wu, H. Zhao, W. Trappe, and K. Ray Liu, "Collusion Resistance of Multimedia Fingerprinting Using Orthogonal Modulation" .submitted to IEEE Trans, on Image Processing, Nov. 2002.
-
(2002)
IEEE Trans, on Image Processing
-
-
Wang, Z.J.1
Wu, M.2
Zhao, H.3
Trappe, W.4
Liu, K.R.5
|