Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes
Tóm tắt
Từ khóa
Tài liệu tham khảo
Andrews G.E., Askey R., Roy R.: Special Functions. Encyclopedia of Mathematics and its Applications. Cambridge University Press (1999).
Bazant M.Z.: Random walks and diffusion. Technical report, MIT Lecture notes, http://www-math.mit.edu/18.366/lec/lec04.pdf (2005). Accessed October 2007
Boneh D., Shaw J. (1998). Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory 44(5): 1897–1905
Chor B., Fiat A., Naor M., Pinkas B. (2000). Tracing traitors. IEEE Trans. Inform. Theory 46(3): 893–910
Cox I.J., Miller M.L., Bloom J.A. (2002). Digital Watermarking. Morgan Kaufmann Publishers, San Francisco, CA, USA
Devroye L.: Non-Uniform Random Variate Generation. Springer-Verlag (1986). Available online at http://cg.scs.carleton.ca/~luc/rnbookindex.htm .
Digital Cinema Initiatives, LLC. Digital cinema system specification v1.1. http://www.dcimovies.com/DCI_DCinema_System_Spec_v1_1.pdf (2007). Accessed October 2007
Hollmann H.D.L., van Lint J.H., Linnartz J-P., Tolhuizen L.M.G.M. (1998). On codes with the identifiable parent property. J. Comb. Theory 82: 472–479
Langelaar G.C., Setyawan I., Lagendijk R.L. (2000). Watermarking digital image and video data. IEEE SPMAG 17(5): 20–46
Peikert C., Shelat A., Smith A.: Lower bounds for collusion-secure fingerprinting. In: Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 472–478 (2003).
Škorić B., Vladimirova T.U., Celik M., Talstra J.C.: Tardos fingerprinting is better than we thought. Technical report, Submitted to IEEE Trans. Inform. Theory. Preprint at arXiv repository, http://www.arxiv.org/abs/cs.CR/0607131 (2006).
Staddon J.N., Stinson D.R., Wei R. (2001). Combinatorial properties of frameproof and traceability codes. IEEE Trans. Inform. Theory 47(3): 1042–1049