{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:57:37Z","timestamp":1725519457997},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540889601"},{"type":"electronic","value":"9783540889618"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88961-8_25","type":"book-chapter","created":{"date-parts":[[2008,10,15]],"date-time":"2008-10-15T01:22:43Z","timestamp":1224033763000},"page":"357-371","source":"Crossref","is-referenced-by-count":3,"title":["Iterative Detection Method for CDMA-Based Fingerprinting Scheme"],"prefix":"10.1007","author":[{"given":"Minoru","family":"Kuribayashi","sequence":"first","affiliation":[]},{"given":"Masakatu","family":"Morii","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Wu, M., Trappe, W., Wang, Z., Liu, K.J.R.: Collusion resistant fingerprinting for multimedia. IEEE Signal Processing Mag., 15\u201327 (2004)","DOI":"10.1109\/MSP.2004.1276103"},{"key":"25_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/3-540-68339-9_8","volume-title":"Advances in Cryptology - EUROCRYPT \u201996","author":"B. Pfitzmann","year":"1996","unstructured":"Pfitzmann, B., Schunter, M.: Asymmetric fingerprinting. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol.\u00a01070, pp. 84\u201395. Springer, Heidelberg (1996)"},{"issue":"5","key":"25_CR3","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I. Cox","year":"1997","unstructured":"Cox, I., Kilian, J., Leighton, F., Shamson, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Process.\u00a06(5), 1673\u20131687 (1997)","journal-title":"IEEE Trans. Image Process."},{"issue":"5","key":"25_CR4","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1109\/TIP.2005.846035","volume":"14","author":"H. Zhao","year":"2005","unstructured":"Zhao, H., Wu, M., Wang, Z., Liu, K.J.R.: Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. IEEE Trans. Image Process.\u00a014(5), 646\u2013661 (2005)","journal-title":"IEEE Trans. Image Process."},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Wang, Z.J., Wu, M., Trappe, W., Liu, K.J.R.: Group-oriented fingerprinting for multimedia forensics. EURASIP J. Appl. Signal Process. (14), 2142\u20132162 (2004)","DOI":"10.1155\/S1110865704312151"},{"issue":"6","key":"25_CR6","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/TIP.2005.847284","volume":"14","author":"Z.J. Wang","year":"2005","unstructured":"Wang, Z.J., Wu, M., Zhao, H., Trappe, W., Liu, K.J.R.: Anti-collusion forensics of multimedia fingerprinting using orthogonal modulatio. IEEE Trans. Image Process.\u00a014(6), 804\u2013821 (2005)","journal-title":"IEEE Trans. Image Process."},{"issue":"5","key":"25_CR7","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Trans. Inform. Theory\u00a044(5), 1897\u20131905 (1998)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"4","key":"25_CR8","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1109\/TSP.2003.809378","volume":"51","author":"W. Trappe","year":"2003","unstructured":"Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Trans. Signal Process.\u00a051(4), 1069\u20131087 (2003)","journal-title":"IEEE Trans. Signal Process."},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/11551492_6","volume-title":"Digital Watermarking","author":"Y. Zhu","year":"2005","unstructured":"Zhu, Y., Feng, D., Zou, W.: Collusion secure convolutional spread spectrum fingerprinting. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol.\u00a03710, pp. 67\u201383. Springer, Heidelberg (2005)"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Tardos, G.: Optimal probabilistic fingerprint codes. In: Proc. 35th ACM Symp. Theory of Comp., pp. 116\u2013125 (2003)","DOI":"10.1145\/780542.780561"},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/978-3-540-75651-4_3","volume-title":"Advances in Information and Computer Security","author":"N. Hayashi","year":"2007","unstructured":"Hayashi, N., Kuribayashi, M., Morii, M.: Collusion-resistant fingerprinting scheme based on the CDMA-technique. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol.\u00a04752, pp. 28\u201343. Springer, Heidelberg (2007)"},{"issue":"1","key":"25_CR12","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1109\/TIT.1968.1054106","volume":"14","author":"R. Gold","year":"1968","unstructured":"Gold, R.: Maximal recursive sequences with 3-valued recursive cross-correlation functions. IEEE Trans. Infom. Theory\u00a014(1), 154\u2013156 (1968)","journal-title":"IEEE Trans. Infom. Theory"},{"key":"25_CR13","unstructured":"Stone, H.: Analysis of attacks on image watermarks with randomized coefficients. NEC Res. Inst., Tech. Rep. 96\u2013045 (1996)"},{"key":"25_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-092534-9.50007-2","volume-title":"Discrete Cosine Transform: Algorithms, Advantages, Applications","author":"K.R. Rao","year":"1990","unstructured":"Rao, K.R., Yip, P.: Discrete Cosine Transform: Algorithms, Advantages, Applications. Academic Press, Boston (1990)"},{"issue":"5","key":"25_CR15","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1109\/83.918570","volume":"10","author":"M. Barni","year":"2001","unstructured":"Barni, M., Bartolini, F., Piva, A.: Improved wavelet-based watermarking through pixel-wise masking. IEEE Trans. on Image Process.\u00a010(5), 783\u2013791 (2001)","journal-title":"IEEE Trans. on Image Process."}],"container-title":["Lecture Notes in Computer Science","Information Hiding"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88961-8_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T17:07:06Z","timestamp":1557853626000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88961-8_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540889601","9783540889618"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88961-8_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}