By Trappe, Wu, Liu

Show description

Read Online or Download Anti-Collusion Fingerprinting for Multimedia PDF

Similar jurisprudence books

Reputation, Celebrity and Defamation Law

Utilizing Robert Post's seminal article 'The Social Foundations of attractiveness and the structure' as a place to begin, this booklet argues that the idea that of popularity alterations traditionally, reflecting social, political, fiscal, cultural and technological adjustments. It additionally means that the price of an outstanding recognition isn't really immutable and analyses the heritage and doctrines of defamation legislations within the US and the united kingdom.

Extra resources for Anti-Collusion Fingerprinting for Multimedia

Example text

W. Hungerford, Algebra, Springer-Verlag, 1974. [35] J. H. Dinitz and D. R. Stinson, Contemporary Design Theory: A Collection of Surveys, John Wiley and Sons, 1992. C. A. Rodger, Design Theory, CRC Press, 1997. [37] R. Lidl and H. Niederreiter, Introduction to Finite Fields and Their Applications, Cambridge Press, 1994. [38] C. J. Colbourn and J. H. Dinitz, The CRC Handbook of Combinatorial Designs, CRC Press, 1996. [39] S. Yau and Y. Bresler, “Maximum likelihood parameter estimation of superimposed signals by dynamic programming,” IEEE Trans.

1993. [40] I. Ziskind and M. Wax, “Maximum likelihood localization of multiple source by alternate projection,” IEEE Trans. ASSP, vol. 36, pp. 1553–1560, Oct. 1988. [41] R. Vaccaro T. Manickam and D. Tufts, “A least-squares algorithm for multipath time-delay estimation,” IEEE Trans. on Signal Processing, vol. 42, pp. 3229–3233, Nov. 1994. 1 0 −25 −10 WNR (dB) −20 −15 −10 −5 0 −25 0 −20 −15 −10 −5 0 WNR (dB) WNR (dB) (e) (f) Figure 5: (a) The fraction of colluders that are successfully captured, or placed under suspicion, (b) the fraction of the total group that are innocent and falsely placed under suspicion for different WNR and different thresholds, (c) the probability of missing user 1 when he is guilty, (d) the probability of falsely accusing user 1 when he is innocent, (e) the probability of not capturing any colluder, and (f) the probability of putting at least one innocent under suspicion.

Kilian, T. Leighton, L. R. Matheson, T. G. Shamoon, R. E. Tarjan, and F. Zane, “Resistance of digital watermarks to collusive attacks,” Tech. Rep. TR-585-98, Department of Computer Science, Princeton University, 1998. K. J. Eggers, and B. Girod, “Capacity of digital watermarks subjected to an optimal collusion attack,” in European Signal Processing Conference (EUSIPCO 2000), 2000. [17] W. Trappe, M. R. Liu, “Collusion-resistant fingerprinting for multimedia,” in IEEE Int. Conference on Acoustics, Speech, and Signal Processing, 2002, pp.

Download PDF sample

Rated 4.62 of 5 – based on 44 votes