[1]
A. Lu. A novel video watermarking scheme against manifold attacks. Journal of Image and Graphics, 14: 11(2009), 2205~2211.
Google Scholar
[2]
C.L. Hou, C.C. Lu, S.C. Tsai, et al. An optimal data hiding scheme with tree-based parity check. IEEE Transactions on Image Processing, 20: 3(2011), 880-886.
DOI: 10.1109/tip.2010.2072513
Google Scholar
[3]
S.H. Liu, L. Han, H.X. Yao. Video watermarking algorithm for resisting collusion attacks. Journal on Communications, 32: 1 (2009), 14-19.
Google Scholar
[4]
L. Zhang, Q.L. Li, D.F. Hu. Scalable anti-collusion digital fingerprinting scheme. Computer Engineering and Applications, 48: 1(2012), 128-131.
Google Scholar
[5]
X.Y. Wang, S. R. Douglas. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking. IEEE Transactions on Dependable and Secure Computing, 8: 3(2011), 434-449.
DOI: 10.1109/tdsc.2010.35
Google Scholar
[6]
Y. Zhu, Y.T. Yang, Z.Y. Ye. An asymmetric spread spectrum fingerprinting with buyer transparency [J]. ACTA ELECTRONICA SINICA, 34: 6(2006), 1041-1047.
Google Scholar
[7]
D.F. Hu, Q.L. Li. Bandwidth efficient asymmetric fingerprinting scheme. International Journal of Communication Systems, 25: 2(2012), 84-91.
DOI: 10.1002/dac.1253
Google Scholar
[8]
C.C. Chang, H.C. Tsai, Y.P. Hsieh. An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Computers & Security , 29: 2(2010), 269-277.
DOI: 10.1016/j.cose.2009.08.008
Google Scholar
[9]
Z. J. Deng, X. J. Lai, D. K. He. Digital rights management model to resell right. Computer Engineering, 2009, 35(20): 20-22.
Google Scholar
[10]
X.S. Chen, L.G. Liu, Z.D. Lu. Design and Analysis of Digital Image Copyright Protection Security Protocol in Internet Environment. Chinese Journal of Computers, 29: 9(2006), 1722-1731.
Google Scholar
[11]
B.I. Federica, B. C. Giulia and N. Alessandro. Teaching multimedia data protection through an international online competition. IEEE Transactions on Education, 54: 3(2011), 381-385.
Google Scholar
[12]
X.P. Zhang, S.Z. Wang. C. Chen. Asymmetric fingerprinting scheme without third party authorization. Journal of Harbin Institute of Technology, 38: 7(2006), 727-730.
Google Scholar