메뉴 건너뛰기




Volumn 26, Issue 1, 2009, Pages 118-139

Behavior modeling and forensics for multimedia social networks: A case study in multimedia fingerprinting

Author keywords

Fingerprint recognition; Humans; Media; Monitoring; Multimedia communication; Peer to peer computing; Social network services

Indexed keywords

BEHAVIORAL RESEARCH; DISTRIBUTED COMPUTER SYSTEMS; MONITORING; MULTIMEDIA SYSTEMS; PATTERN RECOGNITION; PEER TO PEER NETWORKS; SIGNAL PROCESSING; SOCIAL NETWORKING (ONLINE); SOCIAL SCIENCES COMPUTING;

EID: 85032751193     PISSN: 10535888     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2008.930648     Document Type: Article
Times cited : (32)

References (45)
  • 2
    • 25844529486 scopus 로고    scopus 로고
    • Pollution in P2P file sharing systems
    • Mar
    • J. Liang, R. Kumar, Y. Xi, and K.W. Ross, "Pollution in P2P file sharing systems," IEEE InfoCom, vol. 2, pp. 1174-1185, Mar. 2005.
    • (2005) IEEE InfoCom , vol.2 , pp. 1174-1185
    • Liang, J.1    Kumar, R.2    Xi, Y.3    Ross, K.W.4
  • 4
    • 77951157906 scopus 로고    scopus 로고
    • A survey and comparison of Peer-to-Peer overlay network schemes
    • Mar
    • E. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim, "A survey and comparison of Peer-to-Peer overlay network schemes," IEEE Commun. Surveys Tutorial, vol. 7, no. 2, pp. 72-93, Mar. 2004.
    • (2004) IEEE Commun. Surveys Tutorial , vol.7 , Issue.2 , pp. 72-93
    • Lua, E.1    Crowcroft, J.2    Pias, M.3    Sharma, R.4    Lim, S.5
  • 7
    • 0004260006 scopus 로고
    • 3rd ed. New York: Academic
    • G. Owen, Game Theory, 3rd ed. New York: Academic, 1995.
    • (1995) Game Theory
    • Owen, G.1
  • 11
    • 85032751604 scopus 로고    scopus 로고
    • Collusion-resistant fingerprinting for multimedia
    • Mar
    • M. Wu, W. Trappe, Z.J. Wang, and K.J.R. Liu, "Collusion-resistant fingerprinting for multimedia," IEEE Signal Processing Mag., vol. 21, no. 2, pp. 15-27, Mar. 2004.
    • (2004) IEEE Signal Processing Mag , vol.21 , Issue.2 , pp. 15-27
    • Wu, M.1    Trappe, W.2    Wang, Z.J.3    Liu, K.J.R.4
  • 13
    • 85032783063 scopus 로고    scopus 로고
    • Movie 'screener' suspect charged, Chicago man violated Hollywood studios copyright,
    • Online, Available
    • "Movie 'screener' suspect charged, Chicago man violated Hollywood studios copyright," MSNBC News, [Online]. Available: http:// www.msnbc.msn.com/id/4037016
    • MSNBC News
  • 14
    • 0032634857 scopus 로고    scopus 로고
    • Multimedia watermarking techniques
    • July
    • F. Hartung and M. Kutter, "Multimedia watermarking techniques," Proc. IEEE, vol. 87, no. 7, pp. 1079-1107, July 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1079-1107
    • Hartung, F.1    Kutter, M.2
  • 17
    • 0032072279 scopus 로고    scopus 로고
    • Image adaptive watermarking using visual models
    • May
    • C. Podilchuk and W. Zeng, "Image adaptive watermarking using visual models," IEEE J. Select Areas Commun., vol. 16, no. 4, pp. 525-540, May 1998.
    • (1998) IEEE J. Select Areas Commun , vol.16 , Issue.4 , pp. 525-540
    • Podilchuk, C.1    Zeng, W.2
  • 18
    • 0031362116 scopus 로고    scopus 로고
    • Secure spread spectrum watermarking for multimedia
    • Dec
    • I. Cox, J. Killian, F. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Processing vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
    • (1997) IEEE Trans. Image Processing , vol.6 , Issue.12 , pp. 1673-1687
    • Cox, I.1    Killian, J.2    Leighton, F.3    Shamoon, T.4
  • 19
    • 84957610906 scopus 로고    scopus 로고
    • A note on the limits of collusion-resistant watermarks
    • Proc. Advances in Cryptology, EuroCrypto '99
    • F. Ergun, J. Killian, and R. Kumar, "A note on the limits of collusion-resistant watermarks," in Proc. Advances in Cryptology - EuroCrypto '99, (Lecture Notes in Computer Science, vol. 1592), 2001, pp. 140-149.
    • (2001) Lecture Notes in Computer Science , vol.1592 , pp. 140-149
    • Ergun, F.1    Killian, J.2    Kumar, R.3
  • 23
    • 18844450187 scopus 로고    scopus 로고
    • Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
    • May
    • H. Zhao, M. Wu, Z.J. Wang, and K.J.R. Liu, "Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting," IEEE Trans. Image Processing, vol. 14, no. 5, pp. 646-661, May 2005.
    • (2005) IEEE Trans. Image Processing , vol.14 , Issue.5 , pp. 646-661
    • Zhao, H.1    Wu, M.2    Wang, Z.J.3    Liu, K.J.R.4
  • 25
    • 20444373301 scopus 로고    scopus 로고
    • Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation
    • June
    • Z.J. Wang, M. Wu, H. Zhao, W. Trappe, and K.J.R. Liu, "Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation," IEEE Trans. Image Processing, vol. 14, no. 6, pp. 804-821, June 2005.
    • (2005) IEEE Trans. Image Processing , vol.14 , Issue.6 , pp. 804-821
    • Wang, Z.J.1    Wu, M.2    Zhao, H.3    Trappe, W.4    Liu, K.J.R.5
  • 26
    • 84944317710 scopus 로고    scopus 로고
    • Efficient watermark detection and collusion security
    • Lecture of Notes in Computer Science, Feb
    • F. Zane, "Efficient watermark detection and collusion security," in Proc. of Financial Cryptography, (Lecture of Notes in Computer Science, vol. 1962). Feb. 2000, pp. 21-32.
    • (2000) Proc. of Financial Cryptography , vol.1962 , pp. 21-32
    • Zane, F.1
  • 28
    • 33744722091 scopus 로고    scopus 로고
    • Joint coding and embedding techniques for multimedia fingerprinting
    • June
    • S. He and M. Wu, "Joint coding and embedding techniques for multimedia fingerprinting," IEEE Trans. Inform. Forensics and Security, vol. 1, no. 2, pp. 231-247, June 2006.
    • (2006) IEEE Trans. Inform. Forensics and Security , vol.1 , Issue.2 , pp. 231-247
    • He, S.1    Wu, M.2
  • 29
    • 0000676728 scopus 로고    scopus 로고
    • Combining digital watermarks and collusion secure fingerprints for digital images
    • Oct
    • J. Dittmann, P. Schmitt, E. Saar, J. Schwenk, and J. Ueberberg, "Combining digital watermarks and collusion secure fingerprints for digital images," SPIE J. Electron. Imaging, vol. 9, no. 4, pp. 456-467, Oct. 2000.
    • (2000) SPIE J. Electron. Imaging , vol.9 , Issue.4 , pp. 456-467
    • Dittmann, J.1    Schmitt, P.2    Saar, E.3    Schwenk, J.4    Ueberberg, J.5
  • 30
    • 0038527384 scopus 로고    scopus 로고
    • Anti-collusion fingerprinting for multimedia
    • Apr
    • W. Trappe, M. Wu, Z. Wang, and K.J.R. Liu, "Anti-collusion fingerprinting for multimedia," IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 1069-1087, Apr. 2003.
    • (2003) IEEE Trans. Signal Processing , vol.51 , Issue.4 , pp. 1069-1087
    • Trappe, W.1    Wu, M.2    Wang, Z.3    Liu, K.J.R.4
  • 31
    • 11844303521 scopus 로고    scopus 로고
    • Z.J. Wang, M. Wu, W. Trappe, and K.J.R. Liu, Group-oriented fingerprinting for multimedia forensics, EURASIP J. Appl. Signal Processing, Special Issue on Multimedia Security and Rights Management 2004, no. 14, pp. 2142-2162, Nov. 2004.
    • Z.J. Wang, M. Wu, W. Trappe, and K.J.R. Liu, "Group-oriented fingerprinting for multimedia forensics," EURASIP J. Appl. Signal Processing, Special Issue on Multimedia Security and Rights Management vol. 2004, no. 14, pp. 2142-2162, Nov. 2004.
  • 33
    • 33748105251 scopus 로고    scopus 로고
    • Behavior forensics for scalable multiuser collusion: Fairness versus effectiveness
    • Sept
    • H. Zhao and K.J.R. Liu, "Behavior forensics for scalable multiuser collusion: Fairness versus effectiveness," IEEE Trans. Inform. Forensics and Security, vol. 1, no. 3, pp. 311-329, Sept. 2006.
    • (2006) IEEE Trans. Inform. Forensics and Security , vol.1 , Issue.3 , pp. 311-329
    • Zhao, H.1    Liu, K.J.R.2
  • 34
    • 48149092288 scopus 로고    scopus 로고
    • Multi-user collusion behavior forensics: Game-theoretic formulation of fairness dynamics
    • Sept
    • W.S. Lin, H.V. Zhao, and K.J.R. Liu, "Multi-user collusion behavior forensics: Game-theoretic formulation of fairness dynamics," in Proc. IEEE Int. Conf. Image Processing, vol. 6, Sept. 2007, pp. 109-112.
    • (2007) Proc. IEEE Int. Conf. Image Processing , vol.6 , pp. 109-112
    • Lin, W.S.1    Zhao, H.V.2    Liu, K.J.R.3
  • 35
    • 13144275283 scopus 로고    scopus 로고
    • Statistical invisibility for collusionresistant digital video watermarking
    • Feb
    • K. Su, D. Kundur, and D. Hatzinakos, "Statistical invisibility for collusionresistant digital video watermarking," IEEE Trans. Multimedia, vol. 7, no. 1, pp. 43-51, Feb. 2005.
    • (2005) IEEE Trans. Multimedia , vol.7 , Issue.1 , pp. 43-51
    • Su, K.1    Kundur, D.2    Hatzinakos, D.3
  • 36
    • 0038104797 scopus 로고    scopus 로고
    • Blind pattern matching attack on watermarking systems
    • D. Kiroski and F.A.P. Petitcolas, "Blind pattern matching attack on watermarking systems," IEEE Trans. Signal Processing, vol. 51, no. 4, pp. 1045-1053, 2003.
    • (2003) IEEE Trans. Signal Processing , vol.51 , Issue.4 , pp. 1045-1053
    • Kiroski, D.1    Petitcolas, F.A.P.2
  • 37
  • 38
    • 33845615855 scopus 로고    scopus 로고
    • Traitor-within-traitor behavior forensics: Strategy and risk minimization
    • Dec
    • H.V. Zhao and K.J.R. Liu, "Traitor-within-traitor behavior forensics: Strategy and risk minimization," IEEE Trans. Inform. Forensics and Security, vol. 1, no. 4, pp. 440-456, Dec. 2006.
    • (2006) IEEE Trans. Inform. Forensics and Security , vol.1 , Issue.4 , pp. 440-456
    • Zhao, H.V.1    Liu, K.J.R.2
  • 39
    • 1542285823 scopus 로고    scopus 로고
    • Lucas-Kanade 20 years on: A unifying framework
    • Mar
    • S. Baker, R. Gross, I. Matthews, and T. Ishikawa, "Lucas-Kanade 20 years on: A unifying framework," Int. J. Comput. Vis., vol. 56, no. 3, pp. 221-255, Mar. 2004.
    • (2004) Int. J. Comput. Vis , vol.56 , Issue.3 , pp. 221-255
    • Baker, S.1    Gross, R.2    Matthews, I.3    Ishikawa, T.4
  • 40
    • 61449153511 scopus 로고    scopus 로고
    • Selfish colluder detection and identification in traitors within traitors
    • Oct
    • H.V. Zhao and K.J.R. Liu, "Selfish colluder detection and identification in traitors within traitors," in Proc. IEEE Int. Conf. Image Processing, Oct. 2006, pp. 2289-2292.
    • (2006) Proc. IEEE Int. Conf. Image Processing , pp. 2289-2292
    • Zhao, H.V.1    Liu, K.J.R.2
  • 41
    • 34547537601 scopus 로고    scopus 로고
    • Autonomous identification of selfish colluders in traitor-within-traitor behavior forensics
    • Apr
    • H.V. Zhao and K.J.R. Liu, "Autonomous identification of selfish colluders in traitor-within-traitor behavior forensics," IEEE Int. Conf. Acoustics, Speech, and Signal Processing, vol. 2, pp. 149-152, Apr. 2007.
    • (2007) IEEE Int. Conf. Acoustics, Speech, and Signal Processing , vol.2 , pp. 149-152
    • Zhao, H.V.1    Liu, K.J.R.2
  • 42
    • 78649832925 scopus 로고    scopus 로고
    • Scalable multimedia fingerprinting forensics with side information
    • Oct
    • W.S. Lin, H.V. Zhao, and K.J.R. Liu, "Scalable multimedia fingerprinting forensics with side information," in Proc. IEEE Int. Conf. Image Processing, Oct. 2006, pp. 2293-2296.
    • (2006) Proc. IEEE Int. Conf. Image Processing , pp. 2293-2296
    • Lin, W.S.1    Zhao, H.V.2    Liu, K.J.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.