{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:55:29Z","timestamp":1725490529118},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540414162"},{"type":"electronic","value":"9783540444565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-44456-4_8","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T13:47:02Z","timestamp":1188308822000},"page":"97-107","source":"Crossref","is-referenced-by-count":0,"title":["Characteristics of Some Binary Codes for Fingerprinting"],"prefix":"10.1007","author":[{"given":"Tina","family":"Lindkvist","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,3,28]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, B.: An Efficient Public Key Traitor Tracing Scheme. Proceedings of Crypto\u201999. (1999) 338\u2013353. Springer-Verlag Berlin Heidelberg.","DOI":"10.1007\/3-540-48405-1_22"},{"key":"8_CR2","unstructured":"Blakley, G. R., Meadows, C., Purdy G. B.: Fingerprinting Long Forgiving Messages. Proceedings of Crypto `85. (1985) 180\u2013189. Springer-Verlag."},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"IT-44","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Shaw J.: Collusion Secure Fingerprinting for Digital Data. IEEE Transaction on Information Theory, Vol IT-44. (1998) 1897\u20131905.","journal-title":"IEEE Transaction on Information Theory"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Chor, B., Fiat, A., Naor, M.: Tracing Traitors. Proceedings of Crypto\u201994. (1994). Springer-Verlag Berlin Heidelberg.","DOI":"10.1007\/3-540-48658-5_25"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proceedings of IEEE, Vol. 87 (1999) No 7.","DOI":"10.1109\/5.771066"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Kutter, M., Jordan, F., Bossen, F. Digital Signature of Color Images using Amplitude Modulation. SPIE Proceedings, Vol. 3022. (1997) 518\u2013526.","DOI":"10.1117\/12.263442"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Schunter, M.: Asymmetric Fingerprinting. Proceedings of Euorocrypt\u201996. (1996). Springer-Verlag Berlin Heidelberg.","DOI":"10.1007\/3-540-68339-9_8"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Waidner, M.: Anonymous Fingerprinting. Proceedings of Eurocrypt\u201997. (1997). Springer-Verlag Berlin Heidelberg.","DOI":"10.1007\/3-540-69053-0_8"},{"key":"8_CR9","volume-title":"Digital Communications","author":"J. G. Proakis","year":"1995","unstructured":"Proakis, J. G.: Digital Communications. McGraw-Hill Inc., New York. (1995)."},{"issue":"1","key":"8_CR10","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1137\/S0895480196304246","volume":"11","author":"D. R. Stinson","year":"1998","unstructured":"Stinson, D. R.: Combinatorial Properties and Constructions of Traceability Schemes and Frameproof Codes. SIAM Journal on Discrete Mathematics, Volume 11, Number 1. (1998) 41\u201353.","journal-title":"SIAM Journal on Discrete Mathematics"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Wagner, N.: Fingerprinting. Proceedings of the 1983 IEEE Symposium on Security and Privacy. (1983) 18\u201322.","DOI":"10.1109\/SP.1983.10018"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44456-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,26]],"date-time":"2020-04-26T05:09:59Z","timestamp":1587877799000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44456-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540414162","9783540444565"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/3-540-44456-4_8","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}