Handbook of theoretical computer science (vol. A): algorithms and complexity
Handbook of theoretical computer science (vol. A): algorithms and complexity
Randomized algorithms
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
On the Foundations of Modern Cryptography
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
A note on the limits of collusion-resistant watermarks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Multimedia content screening using a dual watermarking and fingerprinting system
Proceedings of the tenth ACM international conference on Multimedia
Lower bounds for collusion-secure fingerprinting
SODA '03 Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms
Fingerprinting and forensic analysis of multimedia
Proceedings of the 12th annual ACM international conference on Multimedia
Fingerprinting Relational Databases: Schemes and Specialties
IEEE Transactions on Dependable and Secure Computing
Building efficient and effective multimedia fingerprints via joint coding and embedding
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Resistance of orthogonal Gaussian fingerprints to collusion attacks
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 2
Optimal probabilistic fingerprint codes
Journal of the ACM (JACM)
Robust MC-CDMA-based fingerprinting against time-varying collusion attacks
IEEE Transactions on Information Forensics and Security
Fingerprinting compressed multimedia signals
IEEE Transactions on Information Forensics and Security
IH'06 Proceedings of the 8th international conference on Information hiding
An estimation attack on content-based video fingerprinting
Transactions on data hiding and multimedia security II
Collusion-resistant fingerprinting systems: review and recent results
Transactions on data hiding and multimedia security V
On the implementation of spread spectrum fingerprinting in asymmetric cryptographic protocol
EURASIP Journal on Information Security
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
Performance study on multimedia fingerprinting employing traceability codes
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Optimization and evaluation of randomized c-secure CRT code defined on polynomial ring
IH'04 Proceedings of the 6th international conference on Information Hiding
A high capacity and strong robust fingerprinting for compressed images
Computers and Electrical Engineering
A simple tracing algorithm for binary fingerprinting code under averaging attack
Proceedings of the first ACM workshop on Information hiding and multimedia security
Hi-index | 0.01 |
We improve on the Boneh-Shaw Fingerprinting scheme in two ways: (i) We merge a Direct Sequence Spread Spectrum (DSSS) embedding layer with the first Boneh-Shaw layer (the so called "驴 code"), effiectively increasing the protected object size by about four orders of magnitude. As a result we have more than one order of magnitude improvement on the size of collusions that we can overcome. (ii) We replace the "marking assumption" with a more realistic assumption, allowing random jamming on the so called "unseen" bits.