标题
A new fingerprinting scheme using social network analysis for majority attack
作者
关键词
Fingerprinting, Collusion attack, Watermarking, Social network
出版物
TELECOMMUNICATION SYSTEMS
Volume 54, Issue 3, Pages 315-331
出版商
Springer Nature
发表日期
2013-08-21
DOI
10.1007/s11235-013-9736-8
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- An Image-Based Approach to Video Copy Detection With Spatio-Temporal Post-Filtering
- (2010) Matthijs Douze et al. IEEE TRANSACTIONS ON MULTIMEDIA
- Bandwidth-effective streaming of educational medical videos
- (2010) Aylin Kantarcı MULTIMEDIA SYSTEMS
- Fine-search for image copy detection based on local affine-invariant descriptor and spatial dependent matching
- (2010) Hefei Ling et al. MULTIMEDIA TOOLS AND APPLICATIONS
- A novel image copy detection scheme based on the local multi-resolution histogram descriptor
- (2010) Zhihua Xu et al. MULTIMEDIA TOOLS AND APPLICATIONS
- Detecting community structure in complex networks via node similarity
- (2010) Ying Pan et al. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS
- Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device
- (2010) Changhoon Lee et al. TELECOMMUNICATION SYSTEMS
- Localized affine transform resistant watermarking in region-of-interest
- (2010) Li Zhang et al. TELECOMMUNICATION SYSTEMS
- A new chaos-based fast image encryption algorithm
- (2009) Yong Wang et al. APPLIED SOFT COMPUTING
- Behavior modeling and forensics for multimedia social networks
- (2009) H. Vicky Zhao et al. IEEE SIGNAL PROCESSING MAGAZINE
- Behavior forensics with side information for multimedia fingerprinting social networks
- (2009) W. Sabrina Lin et al. IEEE Transactions on Information Forensics and Security
- Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks
- (2009) Byung-Ho Cha et al. IEEE Transactions on Information Forensics and Security
- On the security defects of an image encryption scheme
- (2009) Chengqing Li et al. IMAGE AND VISION COMPUTING
- Secure image distribution based on joint decryption and fingerprinting
- (2009) S G Lian IMAGING SCIENCE JOURNAL
- Secure video distribution scheme based on partial encryption
- (2009) Shiguo Lian INTERNATIONAL JOURNAL OF IMAGING SYSTEMS AND TECHNOLOGY
- Quasi-commutative watermarking and encryption for secure media content distribution
- (2009) Shiguo Lian MULTIMEDIA TOOLS AND APPLICATIONS
- Traitor tracing over YouTube video service—proof of concept
- (2009) Joan Tomàs-Buliart et al. TELECOMMUNICATION SYSTEMS
- Requirements for enforcing digital rights management in multicast content distribution
- (2009) Malek Barhoush et al. TELECOMMUNICATION SYSTEMS
- Content and Service Protection for the Ubiquitous TV Based on Network Convergence
- (2009) Shiguo Lian WIRELESS PERSONAL COMMUNICATIONS
- Collusion-Traceable Secure Multimedia Distribution Based on Controllable Modulation
- (2008) Shiguo Lian et al. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY
- Secure media content distribution based on the improved set-top box in IPTV
- (2008) Shiguo Lian et al. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS
- Tardos Fingerprinting is Better Than We Thought
- (2008) B. Skoric et al. IEEE TRANSACTIONS ON INFORMATION THEORY
- Optimal probabilistic fingerprint codes
- (2008) Gábor Tardos JOURNAL OF THE ACM
- Detect overlapping and hierarchical community structure in networks
- (2008) Huawei Shen et al. PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS
- A review on blind detection for image steganography
- (2008) Xiang-Yang Luo et al. SIGNAL PROCESSING
- Efficient image or video encryption based on spatiotemporal chaos system
- (2007) Shiguo Lian CHAOS SOLITONS & FRACTALS
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now