참고문헌
- B.Chor, A. Fiat, M.Naor, and B.Pinkas, 'Tracing traitors,' IEEE Trans. Inform. Theory, vol. 46, pp. 893-910, May, 2000
- H. S. Stone, 'Analysis of attacks on image watermarks with randomized coefficients,' NEC Res. Inst., Tech. Rep. 96-045, 1996
- H. Zhao, M. Wu, Wang Z.J., Liu, K.J.R., 'Nonlinear collusion attacks on indepen dent fingerphnts for multimedia,' Proc. ICME 2003, vol. 1, 2003
- I.Cox, J.Kilian, F.Leighton, and T. Shamoon, 'Secure spread spectrum watermarking for multimedia,' IEEE Trans. Image Processing, vo1.6, pp. 1673-1687, Dec. 1997
- Willard H. Clatworthy , 'Tables of two-as-sociate-class partially balanced designs,' National Bureau of Standards, Washington D.C, U.S. 1973
- W. Trappe, M. Wu, Zhen Wang, and K.J.R. Liu, 'Anti-collusion Fingerprinting for Multimedia,' IEEE Trans. On Signal Processing, vol. 51, 2003, pp. 1069-1087
- M. Barni, F. Bartolini, V. Cappellini, and A. Piva, 'A DCT domain system for robust image watermarking,' Signal Processing, vol. 66, 1998, pp. 357-372
- C.Podilchuk and W.Zeng, 'Image adaptive watermarking using visual models,' IEEE J. Select. Areas on Communications, vol 16, DP.525-540, May 1998