콘텐츠 불법 사용자 추적을 위한 디지털 비디오 핑거프린팅

  • 발행 : 2005.08.01

초록

키워드

참고문헌

  1. B.Chor, A. Fiat, M.Naor, and B.Pinkas, 'Tracing traitors,' IEEE Trans. Inform. Theory, vol. 46, pp. 893-910, May, 2000
  2. H. S. Stone, 'Analysis of attacks on image watermarks with randomized coefficients,' NEC Res. Inst., Tech. Rep. 96-045, 1996
  3. H. Zhao, M. Wu, Wang Z.J., Liu, K.J.R., 'Nonlinear collusion attacks on indepen dent fingerphnts for multimedia,' Proc. ICME 2003, vol. 1, 2003
  4. I.Cox, J.Kilian, F.Leighton, and T. Shamoon, 'Secure spread spectrum watermarking for multimedia,' IEEE Trans. Image Processing, vo1.6, pp. 1673-1687, Dec. 1997
  5. Willard H. Clatworthy , 'Tables of two-as-sociate-class partially balanced designs,' National Bureau of Standards, Washington D.C, U.S. 1973
  6. W. Trappe, M. Wu, Zhen Wang, and K.J.R. Liu, 'Anti-collusion Fingerprinting for Multimedia,' IEEE Trans. On Signal Processing, vol. 51, 2003, pp. 1069-1087
  7. M. Barni, F. Bartolini, V. Cappellini, and A. Piva, 'A DCT domain system for robust image watermarking,' Signal Processing, vol. 66, 1998, pp. 357-372
  8. C.Podilchuk and W.Zeng, 'Image adaptive watermarking using visual models,' IEEE J. Select. Areas on Communications, vol 16, DP.525-540, May 1998