{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T03:18:01Z","timestamp":1772248681539,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,25]],"date-time":"2010-10-25T00:00:00Z","timestamp":1287964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,25]]},"DOI":"10.1145\/1873951.1874073","type":"proceedings-article","created":{"date-parts":[[2010,11,1]],"date-time":"2010-11-01T13:32:23Z","timestamp":1288618343000},"page":"767-770","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Optimal collusion attack for digital fingerprinting"],"prefix":"10.1145","author":[{"given":"Hui","family":"Feng","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Hefei","family":"Ling","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Fuhao","family":"Zou","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]},{"given":"Weiqi","family":"Yan","sequence":"additional","affiliation":[{"name":"Queen's University Belfast, Belfast, United Kingdom"}]},{"given":"Zhengding","family":"Lu","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2010,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.847284"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.809378"},{"key":"e_1_3_2_1_3_1","first-page":"96","article-title":"Analysis of Attacks on image watermarks with randomized coefficients. NEC","author":"Stone H.","year":"1996","unstructured":"H. Stone . 1996 . Analysis of Attacks on image watermarks with randomized coefficients. NEC Res. Inst., Tech. Rep. 96 - 045 . H. Stone. 1996. Analysis of Attacks on image watermarks with randomized coefficients. NEC Res. Inst., Tech. Rep. 96-045.","journal-title":"Res. Inst., Tech. Rep."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.846035"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1027527.1027712"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.821551"},{"key":"e_1_3_2_1_7_1","volume-title":"IEEE International Conference on Acoustics, Speech, and Signal Processing. IEEE Press","author":"Kirovski D.","unstructured":"D. Kirovski , and M. K. Mihcak . 2005. Bounded Gaussian fingerprints and the gradient collusion attack . In IEEE International Conference on Acoustics, Speech, and Signal Processing. IEEE Press , New York, 1037--1040. D. Kirovski, and M. K. Mihcak. 2005. Bounded Gaussian fingerprints and the gradient collusion attack. In IEEE International Conference on Acoustics, Speech, and Signal Processing. IEEE Press, New York, 1037--1040."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1683297.1683345"},{"key":"e_1_3_2_1_9_1","volume-title":"IEEE International Symposium on Information Theory. 271","author":"Kilian J.","unstructured":"J. Kilian , F. T. Leighton , L. R. Matheson et al. 1998. Resistance of digital watermarks to collusive attacks . In IEEE International Symposium on Information Theory. 271 . J. Kilian, F. T. Leighton, L. R. Matheson et al. 1998. Resistance of digital watermarks to collusive attacks. In IEEE International Symposium on Information Theory. 271."}],"event":{"name":"MM '10: ACM Multimedia Conference","location":"Firenze Italy","acronym":"MM '10","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 18th ACM international conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1873951.1874073","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1873951.1874073","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:09:11Z","timestamp":1750248551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1873951.1874073"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,25]]},"references-count":9,"alternative-id":["10.1145\/1873951.1874073","10.1145\/1873951"],"URL":"https:\/\/doi.org\/10.1145\/1873951.1874073","relation":{},"subject":[],"published":{"date-parts":[[2010,10,25]]},"assertion":[{"value":"2010-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}