최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기電子工學會論文誌. Journal of the Institute of Electronics Engineers of Korea. CI, 컴퓨터, v.47 no.6 = no.336, 2010년, pp.1 - 7
최동민 (조선대학교 대학원 컴퓨터공학과) , 성해경 (한양여자대학 컴퓨터정보과) , 이강현 (조선대학교 전자정보공과대학 전자공학과)
This paper presents a novel implementation on multimedia fingerprinting algorithm based on BCH (Bose-Chaudhuri-Hocquenghem) code. The evaluation is put in force the colluder detection to n-1. In the proposed algorit hm, the used collusion attacks adopt logical combinations (AND, OR and XOR) and aver...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Jie Yang, Xiaoxia Xu, "A Robust Anti-collusion Coding in Digital Fingerprinting System," The 8th International Conference on Signal Processing, Vol. 4, 2006.
Jie Yang, Xiaoxia Xu, "A Robust Anti-collusion Coding in Digital Fingerprinting System," IEEE Asia Pacific Conference on Circuits and Systems, APCCAS 2006, pp. 996-999, 4-7 Dec. 2006.
Shashanka D., Bora P.K, "Collusion Secure Scalable Video Fingerprinting Scheme," International Conference on Advanced Computing and Communications, ADCOM 2007, pp. 641-647, 18-21 Dec. 2007.
Zang Li and Trappe W, "Collusion-resistant fingerprints from WBE sequence sets," IEEE International Conference on Communications, ICC 2005, Vol. 2, pp. 1336-1340, 16-20 May 2005.
In Koo Kang, Choong-Hoon Lee, Hae-Yeoun Lee, Jong-Tae Kim, Heung-Kyu Lee, "Averaging attack resilient video fingerprinting," IEEE International Symposium on Circuits and Systems, ISCAS 2005, Vol. 6, pp. 5529-5532, 23-26 May 2005.
J. S. Noh, Kang Hyeon RHEE, "Detection of Colluded Multimedia Fingerprint by Neural Network," IEEK Computer Society, Vol. 43, No. 4, pp. 80-87, July 2006.
Kang Hyeon RHEE, "Detection of Colluded Multimedia fingerprint using LDPC and BIBD," IEEK Computer Society, Vol. 43, No. 5, pp. 68-75, Sept. 2006.
J. Kilian, T. Leighton, L. R. Matheson, T. G. Shammon, R. E. Tarjan and F. Jane, "Resistance of Digital Watermarks to collusive Attacks," Tech. Rep., TR-585-98, Dept. of Computer Science, Princeton University, 1998.
Wade Trappe, Min Wu, Jane Wang and K. J. Ray Liu, "Anti-collusion Fingerprinting for Multimedia," IEEE Tran. on Signal Processing, Vol. 51, No.4, pp. 1069-1087, April 2003.
Kang Hyeon RHEE, "An Evaluation Algorithm of Multimedia Fingerprinting using BIBD code," APIC-IST & ICONI 2009, pp. 411-415, Dec. 2009.
Z. J. Wang, M.Wu, H. Zhao,W. Trappe, and K.J.R. Liu, "Resistance of Orthogonal Gaussian Fingerprints to collusion Attacks," Proc. of ICASSP, pp. 724-727, Apr. 2003.
Shan He andMin Wu, "Performance Study on Multimedia Fingerprinting Employing Traceability Codes," Vol. 3710/2005, pp. 84-96, 2005.
D. Boneh and J. Shaw, "Collusion-secure fingerprinting for digital data," IEEE Tran. on Information Theory, Vol. 44, pp. 1897-1905, September 1998.
http://www.lsi-contest.com/index_e.html
http://www.lsi-contest.com/shiyou_2e.htm
F. Sebe and Domingo-Ferrer, "Short 3-Secure Fingerprinting Codes for Copyright Protection," Lecture Notes in Computer Science, Vol. 2384, pp. 316-327, 2002.
J. Dittmann, "Combining Digital watermarks and Collusion Secure Fingerprints for Customer Copy Monitoring," Proc. IEE Seminar Sec. Image & Image Auth., pp. 128-132, Mar. 2000.
http://mathworld.wolfram.com/BlockDesign.html
Dinitz, J. H. and Stinson, D. R. "A Brief Introduction to Design Theory," Ch. 1 in Contemporary Design Theory: A Collection of Surveys (Ed. J. H. Dinitz and D. R. Stinson). New York: Wiley, pp.1-12, 1992.
Ryser, H. J. "The (b,v,r,k,lambda)-Configuration." 8.1 in Combinatorial Mathematics. Buffalo, NY: Math. Assoc. Amer., pp.96-102, 1963.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.