Collusion-secure fingerprint watermarking for real world applications
dc.contributor.author | Schäfer, Marcel | |
dc.contributor.author | Berchtold, Waldemar | |
dc.contributor.author | Steinebach, Martin | |
dc.contributor.author | Zmudzinski, Sascha | |
dc.contributor.author | Heilmann, Margareta | |
dc.contributor.author | Katzenbeisser, Stefan | |
dc.contributor.editor | Freiling, Felix C. | |
dc.date.accessioned | 2019-01-17T13:26:51Z | |
dc.date.available | 2019-01-17T13:26:51Z | |
dc.date.issued | 2010 | |
dc.description.abstract | Digital transaction watermarking today is a widely accepted mechanism in multimedia security. One major threat on transaction watermarking are collusion attacks. Here multiple individualized copies of the work are mixed to produce a counterfeited or undetectable watermark. One common countermeasure is the usage of so-called fingerprints. Theoretical fingerprint approaches do not consider the inaccuracy of the detection process of watermarking algorithms. In this work we show how an existing fingerprint code can be optimized with respect to code length in order to collaborate with a watermarking algorithm to provide a maximum of reliability with a minimum of payload. | en |
dc.identifier.isbn | 978-3-88579-264-2 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/19776 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Sicherheit 2010. Sicherheit, Schutz und Zuverlässigkeit | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-170 | |
dc.title | Collusion-secure fingerprint watermarking for real world applications | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 140 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 129 | |
gi.conference.date | 5.-7. Oktober 2010 | |
gi.conference.location | Berlin | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1