오디오 핑거프린팅 기술과 응용

  • Published : 2005.08.01

Abstract

Keywords

References

  1. H. Stone. 'Analysis of Attacks on Image Watermarks with Randomized Coefficients,' NEC Technical Report, 1996
  2. V. Wahadaniah, Y. L. Guan, and H. C. Chua, 'A New Collusion Attack and Its Performance Evaluation,' Proceedings in: IWDW, 2002, pp. 88-103
  3. W. Trappe, M. Wu, J. Z. Wang, and K.J.R. Liu, 'Anti-collusion fingerprinting for multimedia,' IEEE Trans. on Signal Processing, Vol. 51, No. 3, pp. 1069-1087, 2003
  4. D. Boneh and J. Shaw, 'Collusion-secure fingerprinting for digital data,' IEEE Trans. on Information Theory, Vol. 44, pp. 1897-1905, 1998
  5. J. Dittmann, 'Combining digital watermarks and collusion fingerprints for customer copy monitoring,' in Proceeding of IEE Semlnars on Secure Images and Image Authentication (SIIA'OO), pp.128- 132, 2000
  6. J. Domingo-Ferrer and J. Herrera-Joancomarti, 'Short collusion-secure fingerprints based on dual binary hamming codes,' Electronic Letters, Vol. 36, No. 20, pp. 1697-1699, 2000