{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:55:10Z","timestamp":1725490510269},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744825"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74484-9_91","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T21:48:03Z","timestamp":1188337683000},"page":"1046-1055","source":"Crossref","is-referenced-by-count":1,"title":["Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods"],"prefix":"10.1007","author":[{"given":"Hyunho","family":"Kang","sequence":"first","affiliation":[]},{"given":"Brian","family":"Kurkoski","sequence":"additional","affiliation":[]},{"given":"Kazuhiko","family":"Yamaguchi","sequence":"additional","affiliation":[]},{"given":"Kingo","family":"Kobayashi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"91_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/11604938_12","volume-title":"Information Security Applications","author":"H.H. Kang","year":"2006","unstructured":"Kang, H.H., Kurkoski, B., Park, Y.R., Lee, H.J., Shin, S.U., Yamaguchi, K., Kobayashi, K.: Video Fingerprinting System using Wavelet and Error Correcting Code. In: Song, J., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol.\u00a03786, pp. 150\u2013164. Springer, Heidelberg (2006)"},{"key":"91_CR2","unstructured":"Kang, H.H., Kurkoski, B., Yamaguchi, K., Kobayashi, K.: Tracing Illegal Users of Video Content Using Watermarking and Fingerprinting. In: SITA\u201905, Proceedings of the 28th Symposium on Information Theory and Its Applications, Japan, vol.\u00a02, pp. 483\u2013486 (2005)"},{"key":"91_CR3","volume-title":"Multimedia Security Handbook","author":"B. Furht","year":"2005","unstructured":"Furht, B., Kirovski, B.: Multimedia Security Handbook. CRC Press, Boca Raton (2005)"},{"key":"91_CR4","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MNET.2003.1174175","volume":"17","author":"P. Judge","year":"2003","unstructured":"Judge, P., Ammar, M.: Security Issues and Solutions in Multicast Content Distribution. IEEE Network\u00a017, 30\u201336 (2003)","journal-title":"IEEE Network"},{"key":"91_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"B. Pfitzmann","year":"1996","unstructured":"Pfitzmann, B., Schunter, M.: Asymmetric Fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 84\u201395. Springer, Heidelberg (1996)"},{"key":"91_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/3-540-69053-0_8","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"B. Pfitzmann","year":"1997","unstructured":"Pfitzmann, B., Waidner, M.: Anonymous Fingerprinting. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 88\u2013102. Springer, Heidelberg (1997)"},{"issue":"6","key":"91_CR7","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1109\/JPROC.2004.827356","volume":"92","author":"D. Kundur","year":"2004","unstructured":"Kundur, D., Karthik, K.: Video Fingerprinting and Encryption Principles for Digital Rights Management. Proceedings of the IEEE\u00a092(6), 918\u2013932 (2004)","journal-title":"Proceedings of the IEEE"},{"key":"91_CR8","unstructured":"Kang, H.H., Park, Y.R., Park, J.H.: Blind Watermarking based on the Spatial Domain. In: Conference on Korea Multimedia Society, Korea, vol.\u00a05(1) (2002)"},{"key":"91_CR9","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann, Academic Press (2002)","DOI":"10.1016\/B978-155860714-9\/50009-2"},{"key":"91_CR10","unstructured":"Stone, H.: Analysis of Attacks on Image Watermarks with Randomized Coefficients. NEC Technical Report (1996)"},{"key":"91_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1007\/3-540-36617-2_7","volume-title":"Digital Watermarking","author":"V. Wahadaniah","year":"2003","unstructured":"Wahadaniah, V., Guan, Y.L., Chua, H.C.: A New Collusion Attack and Its Performance Evaluation. In: Petitcolas, F.A.P., Kim, H.-J. (eds.) IWDW 2002. LNCS, vol.\u00a02613, pp. 64\u201380. Springer, Heidelberg (2003)"},{"issue":"12","key":"91_CR12","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, T., Shanmoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Trans. On Image Processing\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Trans. On Image Processing"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2007"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74484-9_91.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:33:48Z","timestamp":1619519628000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74484-9_91"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744825"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74484-9_91","relation":{},"subject":[]}}