Show simple item record

dc.contributor.authorSchäfer, Marcel
dc.contributor.authorBerchtold, Waldemar
dc.contributor.authorSteinebach, Martin
dc.contributor.authorZmudzinski, Sascha
dc.contributor.authorHeilmann, Margareta
dc.contributor.authorKatzenbeisser, Stefan
dc.contributor.editorFreiling, Felix C.
dc.date.accessioned2019-01-17T13:26:51Z
dc.date.available2019-01-17T13:26:51Z
dc.date.issued2010
dc.identifier.isbn978-3-88579-264-2
dc.identifier.issn1617-5468
dc.identifier.urihttp://dl.gi.de/handle/20.500.12116/19776
dc.description.abstractDigital transaction watermarking today is a widely accepted mechanism in multimedia security. One major threat on transaction watermarking are collusion attacks. Here multiple individualized copies of the work are mixed to produce a counterfeited or undetectable watermark. One common countermeasure is the usage of so-called fingerprints. Theoretical fingerprint approaches do not consider the inaccuracy of the detection process of watermarking algorithms. In this work we show how an existing fingerprint code can be optimized with respect to code length in order to collaborate with a watermarking algorithm to provide a maximum of reliability with a minimum of payload.en
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofSicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-170
dc.titleCollusion-secure fingerprint watermarking for real world applicationsen
dc.typeText/Conference Paper
dc.pubPlaceBonn
mci.reference.pages129-140
mci.conference.sessiontitleRegular Research Papers
mci.conference.locationBerlin
mci.conference.date5.-7. Oktober 2010


Files in this item

Thumbnail

Show simple item record