References
- 노진수, 이강현 "신경회로망에 의한 공모된 멀티미디어 핑거프린트의 검출," 대한전자공학회논문지 제43권 CI편 제4호, pp. 80-87, 2006. 7
- Kang Hyeon RHEE, "DRM Implementation by Multimedia Fingerprint," IEEK Computer Society, Vol.46, No.3, pp. 50-56, 2009. 5
- Skoric B., Vladimirova T. U., Celik M., Talstra J. C., "Tardos Fingerprinting is Better Than We Thought," Information Theory, IEEE Trans., Vol. 54, Issue 8, pp. 3663-3676, 2008 https://doi.org/10.1109/TIT.2008.926307
- W. Trappe, M. Wu, Z. J. Wang and K. J. R. Liu. "Anti-collusion fingerprinting for multimedia," IEEE Trans. Signal Proc. 51(4), pp. 1069-1087, Apr. 2003 https://doi.org/10.1109/TSP.2003.809378
- Dan Boneh, James Shaw, "Collusion-Secure Fingerprinting for Digital Data," IEEE TRANS. ON INFORMATION THEORY, VOL. 44, NO. 5, pp. 1897-1905, Sept. 1998 https://doi.org/10.1109/18.705568
- Kang Hyeon RHEE, "Estimation of multimedia fingerprinting image," Digital Content, Multimedia Technology and its Applications (IDC), 2010 6th International Conference on, pp. 350-353, 2010
- Jie Yang, Ping Liu, GuoZhen Tan, "The digital fingerprint coding based on LDPC," Signal Processing, 2004. Proceedings ICSP '04, 7th Int'l Conf, Vol. 3, pp. 2600-2603, 2004
- Zhang Zhiguang, Chen Xiaosu, Zhou Miao, "A Digital Fingerprint Coding Based on Turbo Codes," Computational Intelligence and Security, 2007 Int'l Conf. pp. 897-901, 2007
- Minoru Kuribayashi, "Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique," EURASIP Journal on Information Security, 2011
- Defa Hu, Qiaoliang Li, "Asymmetric Fingerprinting Based on 1-out-of-n Oblivious Transfer," IEEE COMM. LETTERS, VOL. 14, NO. 5, pp. 453-455, MAY 2010 https://doi.org/10.1109/LCOMM.2010.05.100067
- N. AHMED, T. NATARAJAN, K. R. RAO, "Discrete Cosine Transfonn," IEEE TRANSACTIONS ON COMPUTERS, pp. 90-93, JANUARY 1974
- J. H. van Lint, R. M. Wilson, A Course in Combinatorics, Cambridge, Eng., Cambridge University Press, 1992
- S. S. Shrikhande, and Vasanti N. Bhat-Nayak, "Non-isomorphic solutions of some balanced incomplete block designs I," Journal of Combinatorial Theory, 1970
- http://mathworld.wolfram.com/BlockDesign.html
- Dinitz, J. H. and Stinson, D. R. A Brief Introduction to Design Theory, Ch. 1 in Contemporary Design Theory: A Collection of Surveys, New York: Wiley, pp. 1-12, 1992
-
Ryser H. J. "The (b,v,r,k,lambda)-Configuration."
$\S$ 8.1 in Combinatorial Mathematics. Buffalo, NY: Math. Assoc. Amer., pp. 96-102, 1963 - Jeffrey H. Dinitz, Douglas R. Stinson, Contemporary Design Theory: A Collection of Surveys, Wiley, 1992.
- J. Dittmann, "Combining Digital watermarks and Collusion Secure Fingerprints for Customer Copy Monitoring," Proc. IEE Seminar Sec. Image & Image Auth., pp. 128-132, Mar. 2000
- F. Sebe and Domingo-Ferrer, "Short 3-Secure Fingerprinting Codes for Copyright Protection," Lecture Notes in Computer Science, Vol. 2384, pp. 316-327, 2002