{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:41:27Z","timestamp":1725500487916},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540773696"},{"type":"electronic","value":"9783540773702"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77370-2_20","type":"book-chapter","created":{"date-parts":[[2008,1,3]],"date-time":"2008-01-03T07:14:38Z","timestamp":1199344478000},"page":"294-310","source":"Crossref","is-referenced-by-count":9,"title":["Combining Tardos Fingerprinting Codes and Fingercasting"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Katzenbeisser","sequence":"first","affiliation":[]},{"given":"Boris","family":"\u0160kori\u0107","sequence":"additional","affiliation":[]},{"given":"Mehmet U.","family":"Celik","sequence":"additional","affiliation":[]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/11780656_12","volume-title":"Information Security and Privacy","author":"A. Adelsbach","year":"2006","unstructured":"Adelsbach, A., Huber, U., Sadeghi, A.-R.: Fingercasting\u2014joint fingerprinting and decryption of broadcast messages. In: Batten, L.M., Safavi-Naini, R. (eds.) ACISP 2006. LNCS, vol.\u00a04058, pp. 136\u2013147. Springer, Heidelberg (2006)"},{"key":"20_CR2","first-page":"107","volume-title":"FSE 1997","author":"R.J. Anderson","year":"1997","unstructured":"Anderson, R.J., Manifavas, C.: Chameleon\u2014a new kind of stream cipher. In: FSE 1997. Proceedings of the 4th International Workshop on Fast Software Encryption, London, UK, pp. 107\u2013113. Springer, Heidelberg (1997)"},{"issue":"5","key":"20_CR3","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory\u00a044(5), 1897\u20131905 (1998)","journal-title":"IEEE Transactions on Information Theory"},{"key":"20_CR4","volume-title":"ICASSP 2007","author":"M. Celik","year":"2007","unstructured":"Celik, M., Lemma, A., Katzenbeisser, S., Veen, M.v.d.: Secure embedding of spread-spectrum watermarks using look-up tables. In: ICASSP 2007. International Conference on Acoustics, Speech and Signal Processing, IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"20_CR5","unstructured":"Crowcroft, J., Perkins, C., Brown, I.: A method and apparatus for generating multiple watermarked copies of an information signal. WO Patent 00\/56059 (2000)"},{"key":"20_CR6","doi-asserted-by":"crossref","unstructured":"Emmanuel, S., Kankanhalli, M.S.: Copyright protection for MPEG-2 compressed broadcast video. In: IEEE International Conference on Multimedia and Expo (ICME 2001), pp. 206\u2013209 (2001)","DOI":"10.1109\/ICME.2001.1237692"},{"key":"20_CR7","first-page":"472","volume":"82","author":"H.D.L. Hollmann","year":"1998","unstructured":"Hollmann, H.D.L., van Lint, J.H., Linnartz, J.-P., Tolhuizen, L.M.G.M.: On codes with the identifiable parent property. Journal of Combinatorial Theory\u00a082, 472\u2013479 (1998)","journal-title":"Journal of Combinatorial Theory"},{"issue":"6","key":"20_CR8","doi-asserted-by":"publisher","first-page":"918","DOI":"10.1109\/JPROC.2004.827356","volume":"92","author":"D. Kundur","year":"2004","unstructured":"Kundur, D.: Video fingerprinting and encryption principles for digital rights management. Proceedings of the IEEE\u00a092(6), 918\u2013932 (2004)","journal-title":"Proceedings of the IEEE"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/11922841_35","volume-title":"Digital Watermarking","author":"A. Lemma","year":"2006","unstructured":"Lemma, A., Katzenbeisser, S., Celik, M., van der Veen, M.: Secure watermark embedding through partial encryption. In: Shi, Y.Q., Jeon, B. (eds.) IWDW 2006. LNCS, vol.\u00a04283, pp. 433\u2013445. Springer, Heidelberg (2006)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Parviainen, R., Parnes, P.: Large scale distributed watermarking of multicast media through encryption. In: Proceedings of the International Federation for Information Processing, Communications and Multimedia Security Joint working conference IFIP TC6 and TC11, pp. 149\u2013158 (2001)","DOI":"10.1007\/978-0-387-35413-2_14"},{"key":"20_CR11","unstructured":"Peikert, C., Shelat, A., Smith, A.: Lower bounds for collusion-secure fingerprinting. In: Proceedings of the 14th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pp. 472\u2013478 (2003)"},{"key":"20_CR12","unstructured":"\u0160kori\u0107, B., Vladimirova, T.U., Celik, M., Talstra, J.C.: Tardos fingerprinting is better than we thought. Technical report, arXiv repository, cs.CR\/0607131 (2006), \n                    \n                      http:\/\/www.arxiv.org\/abs\/cs.CR\/0607131"},{"key":"20_CR13","doi-asserted-by":"crossref","unstructured":"Tardos, G.: Optimal probabilistic fingerprint codes. In: Proceedings of the 35th Annual ACM Symposium on Theory of Computing (STOC), pp. 116\u2013125 (2003)","DOI":"10.1145\/780542.780561"},{"key":"20_CR14","unstructured":"\u0160kori\u0107, B., Katzenbeisser, S., Celik, M.U.: Symmetric tardos fingerprinting codes for arbitrary alphabet sizes. Cryptology ePrint Archive, Report 2007\/041 (2007), \n                    \n                      http:\/\/eprint.iacr.org\/2007\/041"}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77370-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,28]],"date-time":"2019-02-28T11:29:20Z","timestamp":1551353360000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77370-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540773696","9783540773702"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77370-2_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}