References
- Minoru Kuribayashi, "Recent Fingerprinting Techniques with Cryptographic Protocol," www.intechopen.com, Signal Processing, Ch. 10, pp. 197-206, 2010.
- Min Wu, Wade Trappe, Z. Jane Wang, and K. J. Ray Liu, "Collusion-resistant fingerprinting for multimedia," IEEE Signal Processing Magazine, pp.15-27, Mar. 2004.
- Yu-Tzu Lin and Ja-Ling Wu, "Practical fingerprinting system for images," Optical Engineering 46(5), 057004, May 2007. https://doi.org/10.1117/1.2740765
- R. Safavi-Naini and Y. Wang, "New results on frame-proof codes and traceability schemes," IEEE Trans. Inform. Theory, vol. 47, no. 11, pp. 3029-3033, Nov. 2001. https://doi.org/10.1109/18.959283
- J. N. Staddon, D. R. Stinson, and R. Wei, "Combinatorial properties of frameproof and traceability codes," IEEE Trans. Inform. Theory, vol. 47, no. 3, pp. 1042-1049, Mar. 2001. https://doi.org/10.1109/18.915661
- D. R. Stinson and R. Wei, "Combinatorial properties and constructions of traceability schemes and frameproof codes," SIAMJ. Discrete Math., vol. 11, pp. 41-53, Feb. 1998. https://doi.org/10.1137/S0895480196304246
- W. Trappe, M. Wu, J. Z. Wang, and K. J. R. Liu, "Anti-collusion fingerprinting for multimedia," IEEE Trans. on Signal Processing, Vol. 51, No. 3, pp. 1069-1087, 2003. https://doi.org/10.1109/TSP.2003.809378
- Yongdong Wu and Zhigang Zhao, "Collusion attack to a scalable AND-ACC fingerprinting scheme," Proc. SPIE 6508, Visual Communications and Image Processing, January 29, 2007.
- Block Design, http://mathworld.wolfram.com/BlockDesign.html, 2012.08 참조
- D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Tran. on Information Theory, vol. 44, pp. 1897-1905, Sept. 1998. https://doi.org/10.1109/18.705568
- Kang Hyeon RHEE, "Detection on the Shift Operation of Multimedia Fingerprinting Code using PCA Method," International Journal of Information Processing and Management(IJIPM), Vol. 3, No. 2, pp.1-6, April 2012.
- Xin Huang and Hongwei Lv, "A C-secure Digital Fingerprinting Scheme Combined with Error-Correcting Code," Multimedia Information Networking and Security (MINES), 2011 Third International Conference on, pp. 297-299, 2011.
- Minquan Cheng and Ying Miao, "On Anti-Collusion Codes and Detection Algorithms for Multimedia Fingerprinting," IEEE Transactions on Information Theory, Vol. 57, Issue: 7, pp. 4843-4851, 2011. https://doi.org/10.1109/TIT.2011.2146130
- Yongsheng Yu, Jinshu Cheng, Zhihua Wei and Ruhan He, "A scheme of betrayal checking and traitor tracing for confidential image in Internet," Measurement, Information and Control (MIC), 2012 International Conference on, Vol. 2, pp. 572-575, 2012.
- Fen Liu, Gui Zhang, "Analysis of Set-cover traitor tracing scheme," Consumer Communications and Networking Conference (CCNC), 2012 IEEE, pp. 512-517, 2012.
- Y. Wu, "Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting," Proc ICASSP 05, vol. 2, pp. 13-16, Mar. 2005.
- 이강현, "BIBD 기반의 멀티미디어 핑거프린팅 코드의 공모코드들에 대한 공모자 추적," 대한전자공학회, 전자공학회논문지-CI, 제46권 제6호, pp. 79-86, 2009.
- 이강현, "신경망을 이용한 멀티미디어 핑거프린팅의 XOR-ACC 구현," 대한전자공학회, 전자공학회 논문지-CI, 제48권 제6호, pp. 1-8, 2011.
- Laarhoven T., Oosterwijk J. and Doumen, J. "Dynamic traitor tracing for arbitrary alphabets: Divide and conquer," Information Forensics and Security (WIFS), 2012 IEEE International Workshop on, pp. 240-245, 2012.
- Shan He and Min Wu, "Performance Study on Multimedia Fingerprinting Employing Traceability Codes," DIGITAL WATERMARKING, Lecture Notes in Computer Science, Vol. 3710/2005, pp. 84-96, 2005.
- Jeffrey H. Dinitz and Douglas R. Stinson, "Contemporary Design Theory: A Collection of Surveys," Wiley, 1992.
Cited by
- Median Filtering Detection using Latent Growth Modeling vol.52, pp.1, 2015, https://doi.org/10.5573/ieie.2015.52.1.061