Download Anti-Collusion Fingerprinting for Multimedia by Trappe, Wu, Liu PDF

By Trappe, Wu, Liu

Show description

Read or Download Anti-Collusion Fingerprinting for Multimedia PDF

Similar jurisprudence books

Latin for Lawyers

If you are simply beginning legislation college, you will soon discover that legal professionals prefer to use outdated latin words. in the event you do not have a consultant to the complicated terminology, you will quick wander off in phrases like "replevin," "seisin," "habeus corpus," and related words. whether you have been training legislation for a few years, this booklet is a must have reference device.

Extra info for Anti-Collusion Fingerprinting for Multimedia

Sample text

Sun, and S. W. Cheng, “Modifications of competitive group testing,” SIAM Journal of Computing, vol. 23, pp. 82–96, Feb. 1994. [32] D. Z. Du and H. Park, “On competitive group testing,” SIAM Journal of Computing, vol. 23, pp. 1019–1025, Oct. 1994. [33] J. Dittmann, P. Schmitt, E. Saar, J. Schwenk, and J. Ueberberg, “Combining digital watermarks and collusion secure fingerprints for digital images,” SPIE Journal of Electronic Imaging, vol. 9, pp. 456–467, 2000. [34] T. W. Hungerford, Algebra, Springer-Verlag, 1974.

ASSP, vol. 36, pp. 1553–1560, Oct. 1988. [41] R. Vaccaro T. Manickam and D. Tufts, “A least-squares algorithm for multipath time-delay estimation,” IEEE Trans. on Signal Processing, vol. 42, pp. 3229–3233, Nov. 1994. 1 0 −25 −10 WNR (dB) −20 −15 −10 −5 0 −25 0 −20 −15 −10 −5 0 WNR (dB) WNR (dB) (e) (f) Figure 5: (a) The fraction of colluders that are successfully captured, or placed under suspicion, (b) the fraction of the total group that are innocent and falsely placed under suspicion for different WNR and different thresholds, (c) the probability of missing user 1 when he is guilty, (d) the probability of falsely accusing user 1 when he is innocent, (e) the probability of not capturing any colluder, and (f) the probability of putting at least one innocent under suspicion.

Z. Du and H. Park, “On competitive group testing,” SIAM Journal of Computing, vol. 23, pp. 1019–1025, Oct. 1994. [33] J. Dittmann, P. Schmitt, E. Saar, J. Schwenk, and J. Ueberberg, “Combining digital watermarks and collusion secure fingerprints for digital images,” SPIE Journal of Electronic Imaging, vol. 9, pp. 456–467, 2000. [34] T. W. Hungerford, Algebra, Springer-Verlag, 1974. [35] J. H. Dinitz and D. R. Stinson, Contemporary Design Theory: A Collection of Surveys, John Wiley and Sons, 1992.

Download PDF sample

Rated 4.81 of 5 – based on 43 votes