1 |
http://mathworld.wolfram.com/BlockDesign.html
|
2 |
Dinitz, J. H. and Stinson, D. R. A Brief Introduction to Design Theory, Ch. 1 in Contemporary Design Theory: A Collection of Surveys, New York: Wiley, pp. 1-12, 1992
|
3 |
Ryser H. J. "The (b,v,r,k,lambda)-Configuration." 8.1 in Combinatorial Mathematics. Buffalo, NY: Math. Assoc. Amer., pp. 96-102, 1963
|
4 |
Jeffrey H. Dinitz, Douglas R. Stinson, Contemporary Design Theory: A Collection of Surveys, Wiley, 1992.
|
5 |
J. Dittmann, "Combining Digital watermarks and Collusion Secure Fingerprints for Customer Copy Monitoring," Proc. IEE Seminar Sec. Image & Image Auth., pp. 128-132, Mar. 2000
|
6 |
F. Sebe and Domingo-Ferrer, "Short 3-Secure Fingerprinting Codes for Copyright Protection," Lecture Notes in Computer Science, Vol. 2384, pp. 316-327, 2002
|
7 |
노진수, 이강현 "신경회로망에 의한 공모된 멀티미디어 핑거프린트의 검출," 대한전자공학회논문지 제43권 CI편 제4호, pp. 80-87, 2006. 7
|
8 |
Kang Hyeon RHEE, "DRM Implementation by Multimedia Fingerprint," IEEK Computer Society, Vol.46, No.3, pp. 50-56, 2009. 5
|
9 |
Skoric B., Vladimirova T. U., Celik M., Talstra J. C., "Tardos Fingerprinting is Better Than We Thought," Information Theory, IEEE Trans., Vol. 54, Issue 8, pp. 3663-3676, 2008
DOI
|
10 |
W. Trappe, M. Wu, Z. J. Wang and K. J. R. Liu. "Anti-collusion fingerprinting for multimedia," IEEE Trans. Signal Proc. 51(4), pp. 1069-1087, Apr. 2003
DOI
ScienceOn
|
11 |
Dan Boneh, James Shaw, "Collusion-Secure Fingerprinting for Digital Data," IEEE TRANS. ON INFORMATION THEORY, VOL. 44, NO. 5, pp. 1897-1905, Sept. 1998
DOI
ScienceOn
|
12 |
Kang Hyeon RHEE, "Estimation of multimedia fingerprinting image," Digital Content, Multimedia Technology and its Applications (IDC), 2010 6th International Conference on, pp. 350-353, 2010
|
13 |
Jie Yang, Ping Liu, GuoZhen Tan, "The digital fingerprint coding based on LDPC," Signal Processing, 2004. Proceedings ICSP '04, 7th Int'l Conf, Vol. 3, pp. 2600-2603, 2004
|
14 |
Zhang Zhiguang, Chen Xiaosu, Zhou Miao, "A Digital Fingerprint Coding Based on Turbo Codes," Computational Intelligence and Security, 2007 Int'l Conf. pp. 897-901, 2007
|
15 |
Minoru Kuribayashi, "Hierarchical Spread Spectrum Fingerprinting Scheme Based on the CDMA Technique," EURASIP Journal on Information Security, 2011
|
16 |
Defa Hu, Qiaoliang Li, "Asymmetric Fingerprinting Based on 1-out-of-n Oblivious Transfer," IEEE COMM. LETTERS, VOL. 14, NO. 5, pp. 453-455, MAY 2010
DOI
|
17 |
S. S. Shrikhande, and Vasanti N. Bhat-Nayak, "Non-isomorphic solutions of some balanced incomplete block designs I," Journal of Combinatorial Theory, 1970
|
18 |
N. AHMED, T. NATARAJAN, K. R. RAO, "Discrete Cosine Transfonn," IEEE TRANSACTIONS ON COMPUTERS, pp. 90-93, JANUARY 1974
|
19 |
J. H. van Lint, R. M. Wilson, A Course in Combinatorics, Cambridge, Eng., Cambridge University Press, 1992
|