A new fingerprinting scheme using social network analysis for majority attack
Published 2013 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A new fingerprinting scheme using social network analysis for majority attack
Authors
Keywords
Fingerprinting, Collusion attack, Watermarking, Social network
Journal
TELECOMMUNICATION SYSTEMS
Volume 54, Issue 3, Pages 315-331
Publisher
Springer Nature
Online
2013-08-21
DOI
10.1007/s11235-013-9736-8
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- An Image-Based Approach to Video Copy Detection With Spatio-Temporal Post-Filtering
- (2010) Matthijs Douze et al. IEEE TRANSACTIONS ON MULTIMEDIA
- Bandwidth-effective streaming of educational medical videos
- (2010) Aylin Kantarcı MULTIMEDIA SYSTEMS
- Fine-search for image copy detection based on local affine-invariant descriptor and spatial dependent matching
- (2010) Hefei Ling et al. MULTIMEDIA TOOLS AND APPLICATIONS
- A novel image copy detection scheme based on the local multi-resolution histogram descriptor
- (2010) Zhihua Xu et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Detecting community structure in complex networks via node similarity
- (2010) Ying Pan et al. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS
- Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device
- (2010) Changhoon Lee et al. TELECOMMUNICATION SYSTEMS
- Localized affine transform resistant watermarking in region-of-interest
- (2010) Li Zhang et al. TELECOMMUNICATION SYSTEMS
- A new chaos-based fast image encryption algorithm
- (2009) Yong Wang et al. APPLIED SOFT COMPUTING
- Behavior modeling and forensics for multimedia social networks
- (2009) H. Vicky Zhao et al. IEEE SIGNAL PROCESSING MAGAZINE
- Behavior forensics with side information for multimedia fingerprinting social networks
- (2009) W. Sabrina Lin et al. IEEE Transactions on Information Forensics and Security
- Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks
- (2009) Byung-Ho Cha et al. IEEE Transactions on Information Forensics and Security
- On the security defects of an image encryption scheme
- (2009) Chengqing Li et al. IMAGE AND VISION COMPUTING
- Secure image distribution based on joint decryption and fingerprinting
- (2009) S G Lian IMAGING SCIENCE JOURNAL
- Secure video distribution scheme based on partial encryption
- (2009) Shiguo Lian INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY
- Quasi-commutative watermarking and encryption for secure media content distribution
- (2009) Shiguo Lian MULTIMEDIA TOOLS AND APPLICATIONS
- Traitor tracing over YouTube video service—proof of concept
- (2009) Joan Tomàs-Buliart et al. TELECOMMUNICATION SYSTEMS
- Requirements for enforcing digital rights management in multicast content distribution
- (2009) Malek Barhoush et al. TELECOMMUNICATION SYSTEMS
- Content and Service Protection for the Ubiquitous TV Based on Network Convergence
- (2009) Shiguo Lian WIRELESS PERSONAL COMMUNICATIONS
- Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation
- (2008) Shiguo Lian et al. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY
- Secure media content distribution based on the improved set-top box in IPTV
- (2008) Shiguo Lian et al. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
- Tardos Fingerprinting is Better Than We Thought
- (2008) B. Skoric et al. IEEE TRANSACTIONS ON INFORMATION THEORY
- Optimal probabilistic fingerprint codes
- (2008) Gábor Tardos JOURNAL OF THE ACM
- Detect overlapping and hierarchical community structure in networks
- (2008) Huawei Shen et al. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS
- A review on blind detection for image steganography
- (2008) Xiang-Yang Luo et al. SIGNAL PROCESSING
- Efficient image or video encryption based on spatiotemporal chaos system
- (2007) Shiguo Lian CHAOS SOLITONS & FRACTALS
Discover Peeref hubs
Discuss science. Find collaborators. Network.
Join a conversationPublish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn More