Author:
Yamada Takaaki,Maeta Michiro,Mizushima Fuminori
Publisher
Springer Science and Business Media LLC
Reference25 articles.
1. George, C., Scerri, J.: Web 2.0 and user-generated content: legal challenges in the new frontier. J. Inf. Law Technol. 2 (2007)
2. Tardos, G.: Optimal probabilistic fingerprint codes. J. ACM 55(2), 1–24 (2008)
3. Boneh, D., Hamburg, M.: Generalized identity based and broadcast encryption schemes. In: Proceedings of ASIACRYPT 2008, pp. 455–470 (2008)
4. Safavi-naini, R., Wang, Y.: Sequential traitor tracing. IEEE Trans. Inf. Theory 49(5), 1319–1326 (2003)
5. Kirovski, D., Malvar, H., Yacobi, Y.: Multimedia content screening using a dual watermarking and fingerprinting system. In: Proceedings of ACM International Conference on Multimedia, pp. 372–381 (2002)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. StreamingTag;Proceedings of the 28th Annual International Conference on Mobile Computing And Networking;2022-10-14
2. A blockchain-based privacy preservation scheme in multimedia network;Multimedia Tools and Applications;2021-01-22
3. Video Watermarking for Persistent and Robust Tracking of Entertainment Content (PARTEC);Advances in Intelligent Systems and Computing;2020-11-25
4. A Scalable Architecture for Uncompressed-Domain Watermarked Videos;IEEE Transactions on Information Forensics and Security;2019-06
5. A Novel Video Watermarking Approach Based on Implicit Distortions;IEEE Transactions on Consumer Electronics;2018-08