References
- H. Stone. 'Analysis of Attacks on Image Watermarks with Randomized Coefficients,' NEC Technical Report, 1996
- V. Wahadaniah, Y. L. Guan, and H. C. Chua, 'A New Collusion Attack and Its Performance Evaluation,' Proceedings in: IWDW, 2002, pp. 88-103
- W. Trappe, M. Wu, J. Z. Wang, and K.J.R. Liu, 'Anti-collusion fingerprinting for multimedia,' IEEE Trans. on Signal Processing, Vol. 51, No. 3, pp. 1069-1087, 2003
- D. Boneh and J. Shaw, 'Collusion-secure fingerprinting for digital data,' IEEE Trans. on Information Theory, Vol. 44, pp. 1897-1905, 1998
- J. Dittmann, 'Combining digital watermarks and collusion fingerprints for customer copy monitoring,' in Proceeding of IEE Semlnars on Secure Images and Image Authentication (SIIA'OO), pp.128- 132, 2000
- J. Domingo-Ferrer and J. Herrera-Joancomarti, 'Short collusion-secure fingerprints based on dual binary hamming codes,' Electronic Letters, Vol. 36, No. 20, pp. 1697-1699, 2000