1 |
2012 Annual Report on Copyright Protection, Korea Federation of Copyright Organization Copyright Protection Center
|
2 |
[2010-24 Trend Analysis on Copyright Technology] Watermark/ Forensic Mark Technology, Korea Copyright Commission
|
3 |
Verimatrix(http://www.verimatrix.com/)
|
4 |
Vobile(http://www.vobileinc.com/)
|
5 |
Enswers Inc.(http://www.enswers.net/)
|
6 |
Civolution(http://www.civolution.com/)
|
7 |
Luo Weiqi, Qu Zhenhua, Pan Feng, and Huang Jiwu,"A survey of passive technology for digital image forensics," Front. Comput. Sci. China 2(1), pp.1−11. 2007
DOI
ScienceOn
|
8 |
White Paper,"Identifying and Managing Digital Media: A Technology Comparison of Digital Watermarking and Fingerprinting," DIGIMARC, 2010
|
9 |
Kang Hyeon RHEE,"Evaluation of Multimedia Fingerprinting Image."Multimedia - A Multidisciplinary Approach to Complex Issues, Published by InTech(www.intechopen.com), pp.141-158 March 2012
|
10 |
Xin-Wei Li, Bao-Long Guo, and Xian-Xiang Wu."On Collusion Attack for Digital Fingerprinting."Journal of Information Hiding and Multimedia Signal Processing, Volume 2, Number 4, pp.366-376, October 2011
|
11 |
Hui feng, Hefei Ling, Fuhao Zou, Weiqi Yan, and Zhengding Lu,"Collusion Attack Optimization Strategy for Digital Fingerprinting,"ACM Transactions on Multimedia Computing, Communications and Applications, Vol. 8, No. S2, Article 36, September 2012
|
12 |
Viktor Wahadaniah, Yong Liang Guan, and Hock Chuan Chua,"A New Collusion Attack and Its Performance Evaluation," IWDW 2002, LNCS 2613, pp.64-80, 2003
|
13 |
Hefei Ling, Hui Feng, Fuhao Zou, Weiqi Yan, and Zhengding Lu,"A Novel Collusion Attack Strategy for Digital Fingerprinting," IWDW 2010, LNCS 6526, pp. 224-238, 2011
|
14 |
Ferdin Joe J and Vaikunda Rja T,"Enhanced Robustness for Digital Images Using Geometric Attack simulation," International Conference on Modelling, Optimization and Computing(ICOMC-2012), Procedia 38(2012), pp.2672-2678, 2012
|
15 |
Yong-Seok Seo, Young-Ho Su, and Chi-Jung Hwang,"DWT-based Image Fingerprinting Scheme Resistant against Geometrical Distortion and Lossy Compression."Proceedings on ICACT 2009, pp.1321-1324, Feb. 2009
|
16 |
Valery Korzhik, Anton Ushmotkin, and Artem Razmov."Collusion-resistant fingerprints based on real superimposed codes,"International Journal of Computer Science and Applications, Vol. 7 No. 3, pp. 1-8, 2010
|