Short collusion-secure fingerprints based on dual binary hamming codes - Electronics Letters

نویسندگان

  • E.
  • J. Hauser
چکیده

TA, = 4 Two-layerADP, Conclusion: Our experimental results prove that the two-layer ADP scheme improves the PSNR of the received video sequence up to 7dB in the presence of packet losses during ATM transmission. Moreover, since the ADP strategy can adapt to the actual network traffic conditions, it is capable of efficiently transmitting video and, more generally, multimedia signals over ATM networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Simple Collusion-Secure Fingerprinting Schemes for Images

This paper describes a robust watermarking algorithm and a collusion-secure fingerprinting scheme based on it. Watermarking robustness is obtained by using the JPEG algorithm to decide mark location and magnitude; the proposed algorithm supports multiple marking. The properties of dual binary Hamming codes are exploited to obtain a fingerprinting scheme secure against collusion of two buyers. T...

متن کامل

Anti-collusion codes: multi-user and multimedia perspectives

Digital fingerprinting is an effective method to identify users who might try to redistribute multimedia content, such as images and video. These fingerprints are typically embedded into the content using watermarking techniques that are designed to be robust to a variety of attacks. A cheap and effective attack against such digital fingerprints is collusion, where several differently marked co...

متن کامل

The Second Generalized Hamming Weight of the Dual Codes of Double-error Correcting Binary Bch-codes

In this note we determine the second generalized Hamming weight of the dual codes of binary doubleerror correcting BCH-codes.

متن کامل

Anti-collusion fingerprinting for multimedia

Digital fingerprinting is a technique for identifying users who might try to use multimedia content for unintended purposes, such as redistribution. These fingerprints are typically embedded into the content using watermarking techniques that are designed to be robust to a variety of attacks. A cost-effective attack against such digital fingerprints is collusion, where several differently marke...

متن کامل

Some Results on Type IV Codes Over

Dougherty, Gaborit, Harada, Munemasa, and Solé have previously given an upper bound on the minimum Lee weight of a Type IV self-dual -code, using a similar bound for the minimum distance of binary doubly even self-dual codes. We improve their bound, finding that the minimum Lee weight of a Type IV self-dual -code of length is at most 4 12 , except when = 4, and = 8 when the bound is 4, and = 16...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004