공모공격에 강인한 디지털 핑거프린팅 기술

  • Published : 2005.08.01

Abstract

Keywords

References

  1. H. Stone, 'Analysis of Attacks on Image Watermarks with Randomized Coefficients,'NEC Technical Report, 1996
  2. V. Wahadaniah, Y.L. Guan, and H.C. Chua, 'A New Collusion Attack and Its Performance Evaluation,' Proceedings of IWDW, 2002, pp. 88-103
  3. B. Pfitzmann and M. Schunter, 'Asymmetric Fingerprinting,' Journal of the ACM, Vol. 33, 1986, pp. 792-807
  4. B. Pfitzmann and M. Waidner, 'Anonymous Fingerprinting,' in Advances in Cryptology. Proc. of EUR0CRYPT'97. Vol. 1233, of Lecture Notes in Computer Science, Springer-Verlag, 1997, pp. 88- 102
  5. B. Pfitzmann and A. Sadeghi, 'Coin-Based Anonymous Fingerprinting,' in Advances in Cryptology, Proc. of EUR0CRYPT'99, Vol. 1592, of Lecture Notes in ComputerScience, Springer-Verlag, 1999, pp. 150-164
  6. D. Kirovski, H.S. Malvar, and Y. Yacobi. 'Multimedia Content Screening using a Dual Watermarking and Fingerprinting System,' ACM Multimedia, 2002
  7. D. Boneh and J. Shaw, 'Collusion-Secure Fingerprinting for Digital Data,' IEEE Trans. Inf. Theory, Vol. 44, No. 5, Sep. 1998, pp. 1897-1905
  8. J. Dittmann, 'Combining Digital Watermarks and Collusion Secure Fingerprints for Customer Copy Monitoring,' Proc. IEE Seminar Sec. Image & Image Auth., Mar. 2000, pp. 128-132
  9. J. Domingo-Ferrer and J. HerreraJoancomarti, 'Simple Collusion-secure Fingerprinting Schemes for Images,' in IEEE International Conference on Infor mation Technology-' Coding and Computing, ITCC'2000. ISBN 0-7695-0540-6, pp 128-132
  10. Yiwei Wang, John F. Doherty, and Robert E. Van Dyck, 'A Watermarking Algorithm for Fingerprinting Intelligence Images,'2001 Conference on Information Sciences and Systems, The Johns Hopkins University, March 21-23, 2001
  11. W. Trappe, M. Wu, and K.J.R. Liu,'Collusion-Resistant Fingerprinting for Multimedia,' Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'02). Vol. IV, Orlando, FL, May 2002, pp. 3309-3312
  12. F. Sebe and J. Domingo-Ferrer, 'Short 3-Secure Fingerprinting Codes for Copyright Protection,' Lecture Notes in Computer Science, Vol. 2384, 2002, pp. 316-327
  13. B. Pfitzmann, 'Trials of Traced Traitors,' Information Hiding, Lecture Notes in Computer Science, Vol. 1174, SphngerVerlag, 1996, pp. 49-64
  14. J. Domingo-Ferrer, 'Anonymous Fingerprinting of Electronic Information with Automatic Identification of Redisthbutors,' Electronics Letters Vol. 34, No. 13, 1998, pp. 1303-1304
  15. J. Kilian, T. Leighton, L.R. Matheson, T.G. Shamoon, R.E. Tarjan, and F. Zane, 'Resistance of Digital Watermarks to Collusive Attacks,' Tech. Rep.. TR-585-98, Dept. of Computer Science, Pnnston University, 1998
  16. W. Trappe, M. Wu, Z. Jane Wang, and K.J.R. Liu, 'Anti-Collusion Fingerprinting for Multimedia,' IEEE Trans..on Signal Processing, Vol. 51, No. 4, Apr. 2003, pp. 1069-1087
  17. Won-gyum Kim and Youngho Suh, 'Short N-Secure Fingerprinting Code for Image,'in Proceedings of IEEE International Conference on Image Processingd(ICIP 2004),pp. 2167-2170, Oct. 24-27, 2004
  18. .F. Ergun, J. Kilian, and R. Kumar, 'A note on the limits of collusion-resistance watermarks,' in Proc. Eurocrypto'99, pp. 140-149, 1999
  19. Z.J.Wang, M. Wu, H. Zhao, W. Trappe, and K.J.R. Liu, 'Resistance of Orthogonal Gaussian Fingerprint to Collusion Attacks,'in Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing(ICASSP03), pp. 724-727, Hong Kong, Apr. 2003