{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:25:13Z","timestamp":1729664713830,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/mmsp.2010.5661992","type":"proceedings-article","created":{"date-parts":[[2010,12,14]],"date-time":"2010-12-14T20:28:14Z","timestamp":1292358494000},"page":"46-51","source":"Crossref","is-referenced-by-count":1,"title":["Considering security and robustness constraints for watermark-based Tardos fingerprinting"],"prefix":"10.1109","author":[{"given":"Benjamin","family":"Mathon","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Bas","sequence":"additional","affiliation":[]},{"given":"Francois","family":"Cayre","sequence":"additional","affiliation":[]},{"given":"Benoit","family":"Macq","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TSP.2005.855418"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TIFS.2008.2009603"},{"year":"2001","author":"hyv\u00e4rinen","article-title":"Independent Component Analysis","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/72.761722"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1049\/ip-ifs:20055144","article-title":"vulnerability of dm watermarking of non-iid host signals to attacks utilising the statistics of independent components","volume":"153","author":"bas","year":"2006","journal-title":"IEE Proceedings Information Security"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/1597817.1597819"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/978-3-540-77370-2_12","article-title":"Practical security analysis of dirty paper trellis watermarking","author":"bas","year":"2007","journal-title":"Proc Information Hiding"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TIT.2008.926307"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TIFS.2007.916006"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-88961-8_24","article-title":"On the design and optimisation of tardos probabilistic fingerprinting codes","author":"furon","year":"2008","journal-title":"Proceedings of 10th International Workshop on Information Hiding"},{"key":"ref4","first-page":"472","article-title":"Lower bounds for collusion-secure fingerprinting","author":"peikert","year":"2003","journal-title":"SODA '03 Proceedings of the fourteenth annual ACM-SIAM symposium on Discrete algorithms"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/1346330.1346335"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TSP.2003.809378"},{"key":"ref5","first-page":"804","article-title":"Collusion resistance of multimedia fingerprinting using orthogonal modulation","author":"wu","year":"2005","journal-title":"IEEE Trans on Image Proc Citeseer"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/MMSP.2001.962734"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1145\/1411328.1411347"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/18.705568"},{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04431-1_13","article-title":"Estimating the minimal length of tardos code","author":"furon","year":"2009","journal-title":"Proc of th Information Hiding Workshop"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/s12243-009-0119-9"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/ISIT.2008.4594980"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1093\/comjnl\/14.4.422"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1093\/comjnl\/7.4.308"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/355656.355659"}],"event":{"name":"2010 IEEE 12th International Workshop on Multimedia Signal Processing (MMSP)","start":{"date-parts":[[2010,10,4]]},"location":"Saint-Malo, France","end":{"date-parts":[[2010,10,6]]}},"container-title":["2010 IEEE International Workshop on Multimedia Signal Processing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5656074\/5661979\/05661992.pdf?arnumber=5661992","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T02:28:10Z","timestamp":1559874490000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5661992\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/mmsp.2010.5661992","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}