[1] Mohaghegh H, Karimin, Samavi H. Framework for watermark robustness adjustment using image depth map[C]//Iranian Conference on Electrical Engineering (ICEE), 2015:555-560.[2] Lin W, Zhao H, Liu K. Game-theoretic strategies and equilibriums in multimedia fingerprinting social networks[J]. IEEE Transaction on Multimedia, 2011, 2(13):191-205.[3] Bianchi T, Piva A. TTP-free asymmetric fingerprinting protocol based on client side embedding[J]. IEEE Transactions on Information Forensics and Security, 2014, 9(10):1577-1568.[4] Bianchi T, Piva A. Secure watermarking for multimedia content protection[J]. IEEE Signal Processing Magazine, 2013, 30(2):87-96.[5] Pfitzmann B, Schunter M. Asymmetric fingerprinting[J]. Advances in Cryptology-Eurocrypt, 1996, 5(12):84-95.[6] Terelius B. Towards transferable watermarks in buyer-seller watermarking protocols[C]//IEEE International Workshop on Information Forensics and Security (WIFS), 2013:197- 202.[7] Memon N, Wong P W. A buyer-seller watermarking protocol[J]. IEEE Transations on Image Processing, 2001, 10(4):643-649.[8] Zhang X. Reversible data hiding in encrypted image[J]. IEEE Signal Processing Letters, 2011, 18(4):255-258.[9] Ibrahim I M, El-Din S H N, Hegazy A F A. An effective and secure buyer-seller water-marking protocol[C]//Third Intemational Symposium of Information Assurance and Seaunity, 2007:21- 28.[10] Paillier P. Public-key cryptosystems based on composite degree residuosity classes[J]. Advances in Cryptology-Eurocrypt 1999. New York:Springer, 1999, 1592:223-238.[11] Kuribayashi M, Tanaka H. Fingerprinting protocol for images based on additive homomorphic property[J]. IEEE Transactions on Image Processing, 2005, 12(14):2129-2139.[12] Bianchi T, Piva A. Secure watermarking for multimedia content protection:a review of its benefits and open issues[J]. IEEE Signal Processing Magazine, 2013, 30:87-96.[13] Prins J P, Erkin Z, Lagend R L. Anonymous fingerprinting with robust QIM watermarking techniques[J]. EURASIP Journal on Information Security, 2007, 8:1-13.[14] Cox I J, Kilian J, Shamoon T. Secure spread spectrum watermarking for multimedia[J]. IEEE Transactions on Image Processing, 1997, 12(6):1673-1687.[15] Perez-Freire L, Comesana-Alfaro P, Perez-Gonzalez F. Detection in quantization-based watermarking:performance and security issues[J]. Security, Steganography, and Watermarking of Multimedia ContentsVⅡ, Proc, 2005, 5681:721-733.[16] Swaminathan A, He S, Wu M. Exploring QIM-based anti-collusion fingerprinting for multimedia[J]. Security, Steganography, and Watermarking of Multimedia Contents VⅢ, 2006, 6072:1-12.[17] Piva A, Bianchi T, Rosa A D. Secure client-side ST-DM watermark embedding[J]. IEEE Transactions on Information Forensics and Security, 2010, 5(1):13-26.[18] Zolotavkin Y, Juhola M. Quantization based watermarking approach with gain attack recovery[C]//International Conference on Digital lmage Computing:Techniques and Applications (DlCTA), 2014:1-8.[19] Praveen V, Vigneshvaran M, Jeba L. Client-side embedding with asymmetric fingerprinting foridentifying illegal distributor[J]. International Journal of Applied Engineering Research, 2015, 10(5):13651-13660. |