1 |
Zhao, H., Wu, M., Wang, J., Ray Liu, K. J.: “Nonlinear collusion attacks on independent Fingerprints for multimedia” ICASSP. Vol.5, pp.664-667 Apr., 2003
|
2 |
Trappe, W., Wu, M., Wangm Z. J., Liu, K. J. R., “Anticollusion fingerprinting for multimedia,” IEEE Trans. Signal Proc. Vol.51, pp.1069-1087, Apr., 2003
DOI
ScienceOn
|
3 |
Kundur D., Karthik K., “Video Fingerprintng and Encryption Principles for Digital Rights Management,” IEEE Proc. Vol.92 pp.918-932, Jun., 2004
DOI
ScienceOn
|
4 |
Hassibi B and Vikalo H., “On the Sphere Decoding Algorithm I. Expected Complexity,” IEEE trans. on signal processing Vol.53, pp.2806-2818, Aug., 2005
DOI
ScienceOn
|
5 |
Li. Z. and Trappe, W., “Collusion-Resistant Fingerprinting from WBE sequence Sets” IEEE Conf. on communications, Vol.2, pp.1336-1340, May, 2005
DOI
|
6 |
Wu. Y., “Linear Combination Collusion Attacks and its Application on an Anti-Collusion Fingerprinting,” IEEE Conf on ICASSP. Vol.51, pp.1069-1087, Apr., 2005
|
7 |
Seol. J. M., Kim S. W., “Scalable Fingerprinting Scheme Using Statistically Secure Anti-Collusion Code for Large Scale Contents Distribution,” Lecture Note on Computer Science, Vol.4906, pp560-569, Oct., 2006
DOI
ScienceOn
|
8 |
Kim, S.W., Suthaharan, S., Lee, H.K., Rao, K.R., “An image watermarking scheme using visual model and BN distribution,” IEE Elect. Letter, Vol.35 (3), Feb., 1999
DOI
ScienceOn
|
9 |
Walpole R. E., Myers R. H. and Myers S. L., “Probability and Statistics for Engineers and Scientists,” 6th ed, Prentice Hall, 1998
|
10 |
Yacobi, Y., “Improved Boneh-Shaw content fingerprinting,” Proc. CTRSA2001, pp.378–91, 2001
DOI
ScienceOn
|
11 |
Boneh, D., Shaw, J., “Collusion-secure fingerprinting for digital data,” IEEE Trans. Inform. Theory, Vol.44, pp.1897-1905, Sept., 1998
DOI
ScienceOn
|
12 |
Colbourn, C. J., Dinitz, J. H., “The CRC Handbook of Combinatorial Design,” Boca Raton, FL: CRC Press 1996
|
13 |
Voloshynovskiy, S., Herrige, A., Baumgaertner, N., Pun, T., “A stochastic approach to content adaptive digital image watermarking”. Lecture Notes in Computer Science, Vol.1768, pp.211-236, Sept., 1999
DOI
ScienceOn
|