Browse > Article

디지털 핑거프린팅에 대한 공모 공격 기술  

김원겸 (한국전자통신연구원)
서용석 (한국전자통신연구원)
이선화 (한국전자통신연구원)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 B. Pfitzmann and A. Sadeghi, 'Coin-Based Anonymous Fingerprinting,' in Advances in Cryptology, Proc. of EUROCRYPT'99, Vol. 1592, of Lecture Notes in Computer Science, Springer-Verlag, 1999, pp. 150- 164
2 W, Trappe, M. Wu, and K.J.R. Liu, 'Collusion-Resistant Fingerprinting for Multimedia,' Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'02), Vol. IV, Orlando, FL, May 2002, pp. 3309-3312
3 J. Domingo-Ferrer, 'Anonymous Finger-printing of Electronic Information with Automatic Identification of Redistributors,' Electronics Letters Vol. 34, No. 13, 1998, pp. 1303-1304   DOI   ScienceOn
4 D. Boneh and J. Shaw, 'Collusion-Secure Fingerprinting for Digital Data,' IEEE Trans. Inf. Theory, Vol. 44, No. 5, Sep. 1998, pp. 1897-1905   DOI   ScienceOn
5 W. Trappe, M. Wu, Z. Jane Wang, and K.J.R. Liu, 'Anti-Collusion Fingerprinting for Multimedia.' IEEE Trans..on Signal Processing, Vol. 51, No.4, Apr. 2003, pp 1069-1087   DOI   ScienceOn
6 H. Stone, 'Analysis of Attacks on Image Watermarks with Randomized Coefficients,' NEC Technical Report, 1996
7 Yiwei Wang, John F. Doherty, and Robert E. Van Dyck, 'A Watermarking Algorithm for Fingerprinting Intelligence Images,' 2001 Conference on Information Sciences and Systems, The Johns Hopkins University, March 21-23, 2001
8 Won-gyum Kim and Youngho Suh. 'Short N-Secure Fingerprinting Code for Image,' in Proceedings of IEEE International Conference on Image Processing(ICIP 2004), pp 2167-2170, Oct. 24-27, 2004
9 Z.J.Wang, M. Wu, H. Zhao, W. Trappe, and K.J.R Liu, 'Resistance of Orthogonal Gaussian Fingerprint to Collusion Attacks,' in Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing(ICASSP' 03), pp. 724-727, Hong Kong, Apr. 2003
10 J. Domingo-Ferrer and J, Herrera-Joancomarti, 'Simple Collusion-secure Fingerprinting Schemes for Images,' in IEEE International Conference on Information Technology: Coding and Computing, ITCC'2000, ISBN 0-7695¬0540-6, pp. 128-132
11 F. Sebe and J. Domingo-Ferrer, 'Short 3-Secure Fingerprinting Codes for Copyright Protection,' Lecture Notes in Computer Science, Vol. 2384, 2002, pp. 316- 327
12 B. Pfitzmann and M. Waldner, 'Anonymous Fingerprinting,' in Advances in Cryptology, Proc. of EUROCRYPT'97, Vol. 1233, of Lecture Notes in Computer Science, Springer-Verlag, 1997, pp. 88- 102
13 B. Pfitzmann and M. Schunter, 'Asymmetric Fingerprinting,' Journal of the ACM, Vol. 33, 1986, pp. 792-807   DOI   ScienceOn
14 J. Kilian, T. Leighton, L.R. Matheson, T.G. Shamoon, R.E. Tarjan, and F. Zane, 'Resistance of Digital Watermarks to Collusive Attacks,' Tech. Rep., TR-585-98, Dept. of Computer Science, Prinston University, 1998
15 F. Ergun, J. Kilian, and R. Kumar, 'A note on the limits of collusion-resistance watermarks,' in Proc. Eurocrypto'99, pp. 140-149, 1999
16 V. Wahadaniah, Y.L. Guan, and H.C. Chua, 'A New Collusion Attack and Its Performance Evaluation,' Proceedings of IWDW, 2002, pp. 88-103
17 B. Pfitzmann, 'Trials of Traced Traitors,' Information Hiding, Lecture Notes in Computer Science, Vol. 1174, Springer- Verlag, 1996, pp. 49-64
18 H. Zhao, M, Wu, Z.J.Wang, and K.J.R. Liu, 'Nonlinear Collusion Attacks on Independent Fingerprints for Multimedia,' in Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing(ICASSP' 03), pp. 664-667, Hong Kong, Apr. 2003
19 J. Dittmann, 'Combining Digital Watermarks and Collusion Secure Fingerprints for Customer Copy Monitoring,' Proc. IEE Seminar Sec. Image & Image Auth ., Mar, 2000, pp. 128-132