{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:03:56Z","timestamp":1725487436866},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540734161"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-73417-8_32","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T16:12:14Z","timestamp":1184602334000},"page":"252-261","source":"Crossref","is-referenced-by-count":2,"title":["Fingerprinting Codes for Live Pay-Television Broadcast Via Internet"],"prefix":"10.1007","author":[{"given":"Shuhui","family":"Hou","sequence":"first","affiliation":[]},{"given":"Tetsutaro","family":"Uehara","sequence":"additional","affiliation":[]},{"given":"Yoshitaka","family":"Morimura","sequence":"additional","affiliation":[]},{"given":"Michihiko","family":"Minoh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Staddon, J.N., Stinson, D.R., Wei, R.: Combinatorial Properties of Frameproof and Traceability Codes. IEEE Transactions on Information Theory 47(3) (2001)","DOI":"10.1109\/18.915661"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. IEEE Transactions on Information Theory 44(5) (1998)","DOI":"10.1109\/18.705568"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Stinson, D.R., van Trung, T., Wei, R.: Secure Frameproof Codes, Key Distribution Patterns, Group Testing Algorithms and Related Structures. Journal of Statistical Planning and Inference 86 (2000)","DOI":"10.1016\/S0378-3758(99)00131-7"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Tina, L., Jacob, L., Mattias, S.: A Class of Traceability Codes. IEEE Transactions on Information Theory 48(7) (2002)","DOI":"10.1109\/TIT.2002.1013151"},{"key":"32_CR5","doi-asserted-by":"crossref","unstructured":"Barg, A., Blakley, G.R., Kabatiansky, G.A.: Digital Fingerprinting Codes: Problem Statements, Constructions, Identification of Traitors, IEEE Transactions on Information Theory 49(4) (2003)","DOI":"10.1109\/TIT.2003.809570"},{"issue":"6","key":"32_CR6","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/TIP.2005.847284","volume":"14","author":"Z.J. Wang","year":"2005","unstructured":"Wang, Z.J., Wu, M., Zhao, H., Trappe, W., Liu, K.J.R.: Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Tran. Image Process.\u00a014(6), 804\u2013821 (2005)","journal-title":"IEEE Tran. Image Process."},{"key":"32_CR7","series-title":"Lecture Notes in Computer Science","volume-title":"Digital Watermarking","author":"S. He","year":"2005","unstructured":"He, S., Wu, M.: Performance Study on Multimedia Fingerprinting Employing Traceability Codes. In: Barni, M., Cox, I., Kalker, T., Kim, H.J. (eds.) IWDW 2005. LNCS, vol.\u00a03710, Springer, Heidelberg (2005)"},{"key":"32_CR8","doi-asserted-by":"crossref","unstructured":"Safavi-Naini, R., Wang, Y.: Collusion Secure q-ary Fingerprinting for Perceptual Content, Security and Privacy in Digital Rights Management (2002)","DOI":"10.1007\/3-540-47870-1_5"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Trappe, W., Wu, M., Jane Wang, Z., Ray Liu, K.J.: Anti-collusion Fingerprinting for Multimedia. IEEE Transactions on Signal Processing\u00a051(4) (2003)","DOI":"10.1109\/TSP.2003.809378"},{"key":"32_CR10","volume-title":"Contemporary Design Theory: A Collection of Surveys","author":"J.H. Dinitz","year":"1992","unstructured":"Dinitz, J.H., Stinson, D.R.: Contemporary Design Theory: A Collection of Surveys. John Wiley and Sons, West Sussex, England (1992)"},{"issue":"1\/2","key":"32_CR11","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1006\/jsco.1999.1007","volume":"31","author":"J.D. Key","year":"2001","unstructured":"Key, J.D.: Some applications of Magma in designs and codes: Oval designs, Hermitian unitals and generalized Reed-Muller codes. J. Symbolic Computation\u00a031(1\/2), 37\u201353 (2001)","journal-title":"J. Symbolic Computation"},{"key":"32_CR12","volume-title":"GLOBECOM\u201903","author":"S.J. Johnson","year":"2003","unstructured":"Johnson, S.J., Weller, S.R.: High-Rate LDPC Codes from Unital Design. In: GLOBECOM\u201903. Global Telecommunications Conference, 2003, IEEE Computer Society Press, Los Alamitos (2003)"}],"container-title":["Lecture Notes in Computer Science","Multimedia Content Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-73417-8_32.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:14:19Z","timestamp":1605762859000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-73417-8_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540734161"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-73417-8_32","relation":{},"subject":[]}}