{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:17:50Z","timestamp":1725491870444},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540741237"},{"type":"electronic","value":"9783540741244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74124-4_22","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T03:06:39Z","timestamp":1189652799000},"page":"328-342","source":"Crossref","is-referenced-by-count":0,"title":["Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting"],"prefix":"10.1007","author":[{"given":"Jae-Min","family":"Seol","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Seong-Whan","family":"Kim","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Yacobi, Y.: Improved Boneh-Shaw Content Fingerprinting. In: Proc. CTRSA 2001, pp. 378\u2013391 (2001)","DOI":"10.1007\/3-540-45353-9_28"},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1109\/TSP.2003.809378","volume":"51","author":"W. Trappe","year":"2003","unstructured":"Trappe, W., Wu, M., Wangm, Z.J., Liu, K.J.R.: Anti-Collusion Fingerprinting for Multimedia. IEEE Trans. Signal Proc.\u00a051, 1069\u20131087 (2003)","journal-title":"IEEE Trans. Signal Proc."},{"key":"22_CR3","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Shaw, J.: Collusion-Secure Fingerprinting for Digital Data. IEEE Trans. Inform. Theory\u00a044, 1897\u20131905 (1998)","journal-title":"IEEE Trans. Inform. Theory"},{"key":"22_CR4","doi-asserted-by":"crossref","DOI":"10.1201\/9781420049954","volume-title":"The CRC Handbook of Combinatorial Design","author":"C.J. Colbourn","year":"1996","unstructured":"Colbourn, C.J., Dinitz, J.H.: The CRC Handbook of Combinatorial Design. CRC Press, Boca Raton (1996)"},{"key":"22_CR5","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1109\/JPROC.2004.827356","volume":"92","author":"D. Kundur","year":"2004","unstructured":"Kundur, D., Karthik, K.: Video Fingerprinting and Encryption Principles for Digital Rights Management. IEEE Proc.\u00a092, 918\u2013932 (2004)","journal-title":"IEEE Proc."},{"key":"22_CR6","first-page":"1069","volume":"51","author":"Y. Wu","year":"2005","unstructured":"Wu, Y.: Linear Combination Collusion Attacks and its Application on an Anti-Collusion Fingerprinting. IEEE Conf. on Acoustics, Speech, and Signal Processing\u00a051, 1069\u20131087 (2005)","journal-title":"IEEE Conf. on Acoustics, Speech, and Signal Processing"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"2806","DOI":"10.1109\/TSP.2005.850352","volume":"53","author":"B. Hassibi","year":"2005","unstructured":"Hassibi, B., Vikalo, H.: On the Sphere Decoding Algorithm I. Expected Complexity. IEEE trans. on signal processing\u00a053, 2806\u20132818 (2005)","journal-title":"IEEE trans. on signal processing"},{"key":"22_CR8","first-page":"1336","volume":"2","author":"Z. Li.","year":"2005","unstructured":"Li., Z., Trappe, W.: Collusion-Resistant Fingerprinting from WBE sequence Sets. IEEE Conf. on communications\u00a02, 1336\u20131340 (2005)","journal-title":"IEEE Conf. on communications"},{"key":"22_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/10719724_16","volume-title":"3rd Int. Workshop on Information Hiding","author":"S. Voloshynovskiy","year":"1999","unstructured":"Voloshynovskiy, S., Herrige, A., Baumgaertner, N., Pun, T.: A Stochastic Approach to Content Adaptive Digital Image Watermarking. In: 3rd Int. Workshop on Information Hiding. LNCS, vol.\u00a01768, pp. 211\u2013236. Springer, Heidelberg (1999)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Watson, A.B., Borthwick, R., Taylor, M.: Image Quality and Entropy Masking. In: SPIE Conf. Human Vision, Visual Processing, and Digital Display VI (1997)","DOI":"10.1117\/12.274501"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Kim, S.W., Suthaharan, S., Lee, H.K., Rao, K.R.: An Image Watermarking Scheme using Visual Model and BN Distribution. IEE Elect. Letter 35(3) (February 1999)","DOI":"10.1049\/el:19990172"},{"key":"22_CR12","volume-title":"Probability and Statistics for Engineers and Scientists","author":"R.E. Walpole","year":"1998","unstructured":"Walpole, R.E., Myers, R.H., Myers, S.L.: Probability and Statistics for Engineers and Scientists, 6th edn. Prentice-Hall, Englewood Cliffs (1998)","edition":"6"},{"key":"22_CR13","first-page":"664","volume":"5","author":"H. Zhao","year":"2003","unstructured":"Zhao, H., Wu, M., Wang, J., Ray Liu, K.J.: Nonlinear Collusion Attacks on Independent Fingerprints for Multimedia. ICASSP\u00a05, 664\u2013667 (2003)","journal-title":"ICASSP"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74124-4_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:11:21Z","timestamp":1619518281000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74124-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540741237","9783540741244"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74124-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}