1 |
이강현, '디지털 영상의 다중 하위 비트플랜에 삽입되는 워터마크,' 대한전자공학회 논문지 CI, 43권 8호, pp.101-109, 2006. 11
과학기술학회마을
|
2 |
Lin W.S., Zhao H.V., Ray liu K.J., 'Scalable Multimedia Fingerprinting Forensics with Side Information,' IEEE International Conference on Image Processing, 2006, pp.2293-2296, 8-11 Oct. 2006
|
3 |
Jie Yang, Ping Liu, GuoZhen Tan, 'The digital fingerprint coding based on LDPC,' Signal Processing, 2004. Proceedings. ICSP '04. 2004 7th International Conference on Volume 3, pp. 2600-2603, 31 Aug.-4 Sept. 2004
|
4 |
Zang Li, Trappe W, 'Collusion-resistant fingerprints from WBE sequence sets,' IEEE International Conference on Communications, ICC 2005, Volume 2, pp. 1336-1340, 16-20 May 2005
DOI
|
5 |
노진수, 이강현 '신경회로망에 의한 공모된 멀티미디어 핑거프린트의 검출' 전자공학회논문지, 제43권 CI편 제4호, pp.80-87, 2006. 7
과학기술학회마을
|
6 |
F. Sebe and Domingo-Ferrer, 'Short 3-Secure Fingerprinting Codes for Copyright Protection,' Lecture Notes in Computer Science, Vol. 2384, pp.316-327, 2002
DOI
ScienceOn
|
7 |
Dinitz, J. H. and Stinson, D. R. 'A Brief Introduction to Design Theory,' Ch. 1 in Contemporary Design Theory: A Collection of Surveys (Ed. J. H. Dinitz and D. R. Stinson). New York: Wiley, pp.1-12, 1992
|
8 |
D. Boneh and J. Shaw, 'Collusion-secure fingerprinting for digital data,' IEEE Tran. on Information Theory, vol. 44, pp. 1897-1905, September 1998
DOI
ScienceOn
|
9 |
J. Kilian, T. Leighton, L. R. Matheson, T. G. Shammon, R. E. Tarjan and F. Jane, 'Resistance of Digital Watermarks to collusive Attacks,' Tech. Rep., TR-585-98, Dept. of Computer Science, Prinston University, 1998
|
10 |
In Koo Kang, Choong-Hoon Lee, Hae-Yeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, 'Averaging attack resilient video fingerprinting,' IEEE International Symposium on Circuits and Systems, ISCAS 2005, Vol. 6, pp.5529-5532, 23-26 May 2005
|
11 |
Trappe W., Min Wu, Ray Liu K.J., 'Collusion-resistant fingerprinting for multimedia,' IEEE International Conference on Acoustics, Speech, and Signal Processing 2002, Proceedings(ICASSP '02), vol.4, pp. IV-3309-IV-3312, 13-17 May 2002
|
12 |
김원겸, 이선화, 서용석, '공모공격에 강인한 디지털 핑거프린팅 기술,' 정보과학회지, 23권 8호, pp.52-60, 2005.8
과학기술학회마을
|
13 |
Jie Yang, Xiaoxia Xu, 'A Robust Anti-collusion Coding in Digital Fingerprinting System,' The 8th International Conference on Signal Processing, Volume 4, 2006.
|
14 |
Ryser, H. J. 'The (b,v,r,k,lambda)-Configuration.' 8.1 in Combinatorial Mathematics. Buffalo, NY: Math. Assoc. Amer., pp.96-102, 1963
|
15 |
Wade Trappe, Min Wu, Jane Wang and K.J. Ray Liu 'Anti-collusion Fingerprinting for Multimedia,' IEEE Tran. on Signal Processing, VOL.51, NO.4, pp.1069-1087, April 2003
DOI
ScienceOn
|
16 |
K.H. Rhee, 'Detection of Colluded Multimedia fingerprint using LDPC and BIBD,' IEEK Computer Society, Vol.43, No.5, pp.68-75, Sept. 2006
과학기술학회마을
ScienceOn
|
17 |
J. Dittmann, 'Combining Digital watermarks and Collusion Secure Fingerprints for Customer Copy Monitoring,' Proc. IEE Seminar Sec. Image & Image Auth., pp.128-132, Mar. 2000
DOI
|
18 |
ie Yang, Xiaoxia Xu, 'A Robust Anti-collusion Coding in Digital Fingerprinting System,' IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2006, pp.996-999, 4-7 Dec. 2006
|
19 |
http://mathworld.wolfram.com/BlockDesign.html
|
20 |
K.H. Rhee, 'DRM Implementation by Multimedia Fingerprint,' IEEK Computer Society, Vol.46, No.3, pp.50-56, 2009. 5
과학기술학회마을
ScienceOn
|
21 |
Shashanka D., Bora P.K, 'Collusion Secure Scalable Video Fingerprinting Scheme,' International Conference on Advanced Computing and Communications, ADCOM 2007, pp.641-647, 18-21 Dec. 2007
DOI
|