References
- H. Stone, 'Analysis of Attacks on Image Watermarks with Randomized Coefficients,'NEC Technical Report, 1996
- V. Wahadaniah, Y.L. Guan, and H.C. Chua, 'A New Collusion Attack and Its Performance Evaluation,' Proceedings of IWDW, 2002, pp. 88-103
- B. Pfitzmann and M. Schunter, 'Asymmetric Fingerprinting,' Journal of the ACM, Vol. 33, 1986, pp. 792-807
- B. Pfitzmann and M. Waidner, 'Anonymous Fingerprinting,' in Advances in Cryptology. Proc. of EUR0CRYPT'97. Vol. 1233, of Lecture Notes in Computer Science, Springer-Verlag, 1997, pp. 88- 102
- B. Pfitzmann and A. Sadeghi, 'Coin-Based Anonymous Fingerprinting,' in Advances in Cryptology, Proc. of EUR0CRYPT'99, Vol. 1592, of Lecture Notes in ComputerScience, Springer-Verlag, 1999, pp. 150-164
- D. Kirovski, H.S. Malvar, and Y. Yacobi. 'Multimedia Content Screening using a Dual Watermarking and Fingerprinting System,' ACM Multimedia, 2002
- D. Boneh and J. Shaw, 'Collusion-Secure Fingerprinting for Digital Data,' IEEE Trans. Inf. Theory, Vol. 44, No. 5, Sep. 1998, pp. 1897-1905
- J. Dittmann, 'Combining Digital Watermarks and Collusion Secure Fingerprints for Customer Copy Monitoring,' Proc. IEE Seminar Sec. Image & Image Auth., Mar. 2000, pp. 128-132
- J. Domingo-Ferrer and J. HerreraJoancomarti, 'Simple Collusion-secure Fingerprinting Schemes for Images,' in IEEE International Conference on Infor mation Technology-' Coding and Computing, ITCC'2000. ISBN 0-7695-0540-6, pp 128-132
- Yiwei Wang, John F. Doherty, and Robert E. Van Dyck, 'A Watermarking Algorithm for Fingerprinting Intelligence Images,'2001 Conference on Information Sciences and Systems, The Johns Hopkins University, March 21-23, 2001
- W. Trappe, M. Wu, and K.J.R. Liu,'Collusion-Resistant Fingerprinting for Multimedia,' Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'02). Vol. IV, Orlando, FL, May 2002, pp. 3309-3312
- F. Sebe and J. Domingo-Ferrer, 'Short 3-Secure Fingerprinting Codes for Copyright Protection,' Lecture Notes in Computer Science, Vol. 2384, 2002, pp. 316-327
- B. Pfitzmann, 'Trials of Traced Traitors,' Information Hiding, Lecture Notes in Computer Science, Vol. 1174, SphngerVerlag, 1996, pp. 49-64
- J. Domingo-Ferrer, 'Anonymous Fingerprinting of Electronic Information with Automatic Identification of Redisthbutors,' Electronics Letters Vol. 34, No. 13, 1998, pp. 1303-1304
- J. Kilian, T. Leighton, L.R. Matheson, T.G. Shamoon, R.E. Tarjan, and F. Zane, 'Resistance of Digital Watermarks to Collusive Attacks,' Tech. Rep.. TR-585-98, Dept. of Computer Science, Pnnston University, 1998
- W. Trappe, M. Wu, Z. Jane Wang, and K.J.R. Liu, 'Anti-Collusion Fingerprinting for Multimedia,' IEEE Trans..on Signal Processing, Vol. 51, No. 4, Apr. 2003, pp. 1069-1087
- Won-gyum Kim and Youngho Suh, 'Short N-Secure Fingerprinting Code for Image,'in Proceedings of IEEE International Conference on Image Processingd(ICIP 2004),pp. 2167-2170, Oct. 24-27, 2004
- .F. Ergun, J. Kilian, and R. Kumar, 'A note on the limits of collusion-resistance watermarks,' in Proc. Eurocrypto'99, pp. 140-149, 1999
- Z.J.Wang, M. Wu, H. Zhao, W. Trappe, and K.J.R. Liu, 'Resistance of Orthogonal Gaussian Fingerprint to Collusion Attacks,'in Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing(ICASSP03), pp. 724-727, Hong Kong, Apr. 2003