{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T21:10:14Z","timestamp":1740863414950,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642184048"},{"type":"electronic","value":"9783642184055"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-18405-5_19","type":"book-chapter","created":{"date-parts":[[2011,1,15]],"date-time":"2011-01-15T15:35:36Z","timestamp":1295105736000},"page":"224-238","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Collusion Attack Strategy for Digital Fingerprinting"],"prefix":"10.1007","author":[{"given":"Hefei","family":"Ling","sequence":"first","affiliation":[]},{"given":"Hui","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Fuhao","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Weiqi","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Zhengding","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"19_CR1","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1109\/18.705568","volume":"44","author":"D. Boneh","year":"1998","unstructured":"Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. IEEE Transactions on Information Theory\u00a044(5), 1897\u20131905 (1998)","journal-title":"IEEE Transactions on Information Theory"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Wang, Z.J., Wu, M., Zhao, H., Liu, K.J.R., Trappe, W.: Resistance of orthogonal Gaussian fingerprints to collusion attacks. In: International Conference on Multimedia and Expo., pp. 724\u2013727 (2003)","DOI":"10.1109\/ICASSP.2003.1202745"},{"issue":"4","key":"19_CR3","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1109\/TSP.2003.809378","volume":"51","author":"W. Trappe","year":"2003","unstructured":"Trappe, W., Wu, M., Wang, Z.J., Liu, K.J.R.: Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing\u00a051(4), 1069\u20131087 (2003)","journal-title":"IEEE Transactions on Signal Processing"},{"issue":"4","key":"19_CR4","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1117\/1.1287729","volume":"9","author":"J. Dittmann","year":"2000","unstructured":"Dittmann, J., Schmitt, P., Saar, E., Schwenk, J., Ueberberg, J.: Combining digital watermarks and collusion secure fingerprints for digital images. Journal of Electronic Imaging\u00a09(4), 456\u2013467 (2000)","journal-title":"Journal of Electronic Imaging"},{"issue":"2","key":"19_CR5","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1109\/TIFS.2006.873597","volume":"1","author":"S. He","year":"2006","unstructured":"He, S., Wu, M.: Joint coding and embedding techniques for Multimedia Fingerprinting. IEEE Transactions on Information Forensics and Security\u00a01(2), 231\u2013247 (2006)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"3","key":"19_CR6","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/TIFS.2009.2025849","volume":"4","author":"B.H. Cha","year":"2009","unstructured":"Cha, B.H., Kuo, C.C.J.: Robust MC-CDMA-Based Fingerprinting Against Time-Varying Collusion Attacks. IEEE Transactions on Information Forensics and Security\u00a04(3), 302\u2013317 (2009)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"Byung-Ho, C., Kuo, C.C.J.: Analysis of time-varying collusion attacks in fingerprinting systems: Capacity and throughput. In: IEEE International Symposium on Circuits and Systems, ISCAS 2009, pp. 493\u2013496 (2009)","DOI":"10.1109\/ISCAS.2009.5117793"},{"issue":"6","key":"19_CR8","doi-asserted-by":"publisher","first-page":"804","DOI":"10.1109\/TIP.2005.847284","volume":"14","author":"Z.J. Wang","year":"2005","unstructured":"Wang, Z.J., Wu, M., Zhao, H.V., Trappe, W., Liu, K.J.R.: Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation. IEEE Transactions on Image Processing\u00a014(6), 804\u2013821 (2005)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"11","key":"19_CR9","first-page":"2","volume":"14","author":"Z.J. Wang","year":"2004","unstructured":"Wang, Z.J., Wu, M., Trappe, W., Liu, K.J.R.: Group-oriented fingerprinting for multimedia forensics. EURASIP Journal on Applied Signal Processing\u00a014(11), 2 (2004)","journal-title":"EURASIP Journal on Applied Signal Processing"},{"key":"19_CR10","unstructured":"Stone, H.: Analysis of Attacks on image watermarks with randomized coefficients. NEC Res. Inst., Tech. Rep., vol. 96-045 (1996)"},{"issue":"5","key":"19_CR11","doi-asserted-by":"publisher","first-page":"646","DOI":"10.1109\/TIP.2005.846035","volume":"14","author":"H.V. Zhao","year":"2005","unstructured":"Zhao, H.V., Min, W., Wang, Z.J., Liu, K.J.R.: Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting. IEEE Transactions on Image Processing\u00a014(5), 646\u2013661 (2005)","journal-title":"IEEE Transactions on Image Processing"},{"key":"19_CR12","doi-asserted-by":"crossref","unstructured":"Hong, Z., Min, W., Wang, Z.J., Liu, K.J.R.: Performance of detection statistics under collusion attacks on independent multimedia fingerprints. In: Proceedings of 2003 International Conference on Multimedia and Expo., ICME 2003, vol.\u00a0201, pp. I-205\u2013I-208 (2003)","DOI":"10.1109\/ICME.2003.1220890"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Moulin, P., Kiyevash, N.: Performance of Random Fingerprinting Codes Under Arbitrary Nonlinear Attacks. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2007, pp. II-157\u2013II-160 (2007)","DOI":"10.1109\/ICASSP.2007.366196"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Kiyavash, N., Moulin, P.: A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems. In: 2006 40th Annual Conference on Information Sciences and Systems, pp. 1170\u20131175 (2006)","DOI":"10.1109\/CISS.2006.286642"},{"issue":"3","key":"19_CR15","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1109\/TIFS.2009.2026462","volume":"4","author":"N. Kiyavash","year":"2009","unstructured":"Kiyavash, N., Moulin, P.: Performance of Orthogonal Fingerprinting Codes Under Worst-Case Noise. IEEE Transactions on Information Forensics and Security\u00a04(3), 293\u2013301 (2009)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Kirovski, D., Mihcak, M.K.: Bounded Gaussian fingerprints and the gradient collusion attack. In: Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing, vol.\u00a02, pp. 1037\u20131040 (2005)","DOI":"10.1109\/ICASSP.2005.1415585"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Kirovski, D.: Collusion of fingerprints via the gradient attack. In: IEEE International Symposium on Information Theory, Citeseer, p. 2280 (2005)","DOI":"10.1109\/ISIT.2005.1523754"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"He, S., Kirovski, D., Wu, M.: Colluding Fingerprinted Video Using the Gradient Attack. In: IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2007, vol.\u00a02 (2007)","DOI":"10.1109\/ICASSP.2007.366197"},{"issue":"4","key":"19_CR19","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/49.668975","volume":"16","author":"C.I. Podilchuk","year":"1998","unstructured":"Podilchuk, C.I., Zeng, W.: Image-adaptive watermarking using visual models. IEEE Journal on Selected Areas in Communications\u00a016(4), 525\u2013539 (1998)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"19_CR20","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1109\/TIFS.2007.908179","volume":"2","author":"S. He","year":"2007","unstructured":"He, S., Wu, M.: Collusion-Resistant Video Fingerprinting for Large User Group. IEEE Transactions on Information Forensics and Security\u00a02(4), 697\u2013709 (2007)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"12","key":"19_CR21","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I.J. Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing\u00a06(12), 1673\u20131687 (1997)","journal-title":"IEEE Transactions on Image Processing"},{"issue":"6","key":"19_CR22","doi-asserted-by":"publisher","first-page":"792","DOI":"10.1109\/TIP.2003.821551","volume":"13","author":"M.L. Miller","year":"2004","unstructured":"Miller, M.L., Doerr, G.J., Cox, I.J.: Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Transactions on Image Processing\u00a013(6), 792\u2013807 (2004)","journal-title":"IEEE Transactions on Image Processing"},{"key":"19_CR23","doi-asserted-by":"crossref","unstructured":"Lin, W.S., Zhao, H.V., Liu, K.J.R.: A Game Theoretic Framework for Colluder-Detector Behavior Forensics. In: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, vol.\u00a02, pp. II-721\u2013II-724 (2007)","DOI":"10.1109\/ICASSP.2007.366337"},{"key":"19_CR24","unstructured":"The USC-SIPI Image Database. Electronic Engineering Department, University of Southern California, http:\/\/sipi.usc.edu\/database\/index.html , (accessed September 9, 2009)"},{"key":"19_CR25","unstructured":"Ground Truth Database. Department of Computer Science and Engineering, University of Washington, http:\/\/www.cs.washington.edu\/research\/imagedatabase\/ , (accessed September 9, 2009)"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-18405-5_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T20:57:27Z","timestamp":1740862647000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-18405-5_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642184048","9783642184055"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-18405-5_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}