On codes with the identifiable parent property
Journal of Combinatorial Theory Series A
Watermarking, tamper-proffing, and obfuscation: tools for software protection
IEEE Transactions on Software Engineering
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Error- and Collusion-Secure Fingerprinting for Digital Data
IH '99 Proceedings of the Third International Workshop on Information Hiding
Collusion Secure q-ary Fingerprinting for Perceptual Content
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Improved decoding of Reed-Solomon and algebraic-geometry codes
IEEE Transactions on Information Theory
Combinatorial properties of frameproof and traceability codes
IEEE Transactions on Information Theory
Digital fingerprinting codes: problem statements, constructions, identification of traitors
IEEE Transactions on Information Theory
Applications of list decoding to tracing traitors
IEEE Transactions on Information Theory
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Building efficient and effective multimedia fingerprints via joint coding and embedding
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Digital Rights Management in Ubiquitous Computing
IEEE MultiMedia
Content adaptive watermarking for multimedia fingerprinting
Computer Standards & Interfaces
On-off keying modulation and tardos fingerprinting
Proceedings of the 10th ACM workshop on Multimedia and security
Performance study on multimedia fingerprinting employing traceability codes
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Fingerprinting schemes. identifying the guilty sources using side information
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
A practical solution for distribution rights protection in multicast environments
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Hi-index | 0.00 |
To protect intellectual property and distribution rights against dishonest customers in the multimedia content market, fingerprinting schemes that use error-correcting codes help identify users illegally redistributing media. This article presents a traitor-tracing algorithm that takes advantage of soft-decision decoding techniques to find all identifiable traitors.