Sciweavers

ICIP
2006
IEEE
14 years 6 months ago
Behavior Forensics in Traitors within Traitors for Scalable Multimedia
A cost effective attack against multimedia forensics is the multiuser collusion attack, in which several attackers mount attacks collectively to remove traces of the identifying f...
K. J. Ray Liu, H. Vicky Zhao
ICIP
2006
IEEE
14 years 6 months ago
Selfish Colluder Detection and Identification in Traitors within Traitors
During collusion attacks against multimedia forensics, an important issue that colluders need to address is the fairness of the attack, i.e., whether all colluders take the same r...
H. Vicky Zhao, K. J. Ray Liu
ICIP
2006
IEEE
14 years 6 months ago
Scalable Multimedia Fingerprinting Forensics with Side Information
Digital fingerprinting uniquely labels each distributed copy with user's ID and provides a proactive means to track the distribution of multimedia. Multi-user collusion is a ...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
ICIP
2007
IEEE
14 years 6 months ago
Multi-User Collusion Behavior Forensics: Game Theoretic Formulation of Fairness Dynamics
Multi-user collusion is an cost-effective attack against digital fingerprinting, in which a group of attackers collectively undermine the traitor tracing capability of digital fin...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu