Signal Processing 2010
DOI: 10.5772/8522
|View full text |Cite
|
Sign up to set email alerts
|

Recent Fingerprinting Techniques with Cryptographic Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2013
2013
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 36 publications
0
2
0
1
Order By: Relevance
“…where SSIM denotes the SSIM , µ x denotes the average of x, µ y denotes the average of y, σ 2 x denotes the variance of x, σ 2 y denotes the variance of y, σ xy denotes the covariance of x and y, and c 1 and c 2 are two variables to stabilize the division with weak denominator. c 1 = (k 1 R) 2 and c 2 = (k 2 R) 2 , where R denotes the dynamic range of the pixel values (typically 2 #bitsperpixel -1), and k 1 = 0.01 and k 2 = 0.03 by default. The SSIM index then ranges from -1 to +1.…”
Section: Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…where SSIM denotes the SSIM , µ x denotes the average of x, µ y denotes the average of y, σ 2 x denotes the variance of x, σ 2 y denotes the variance of y, σ xy denotes the covariance of x and y, and c 1 and c 2 are two variables to stabilize the division with weak denominator. c 1 = (k 1 R) 2 and c 2 = (k 2 R) 2 , where R denotes the dynamic range of the pixel values (typically 2 #bitsperpixel -1), and k 1 = 0.01 and k 2 = 0.03 by default. The SSIM index then ranges from -1 to +1.…”
Section: Securitymentioning
confidence: 99%
“…The author is with The Sirindhorn International Thai-German Graduate School of Engineering, King Mongkut's University of Technology North Bangkok, Thailand, E-mail: wannida.s@tggs.kmutnb.ac.th2 The author is with Department of Electrical and Telecommunication Engineering, Rajamangala University of Technology Krungthep, Thailand, E-mail: adisorn.s@mail.rmutk.ac.th…”
mentioning
confidence: 99%
“…In copyright-protected image trading systems [1][2][3], the consumer ID is embedded into the original commercial image by the CP using a fingerprinting technique as shown in Fig. 1.…”
Section: Conventional Copyright-and Privacy-protected Image Tradingmentioning
confidence: 99%
“…Copyright protection and privacy protection are very important for such kinds of goods. In image trading systems, a commercial image is always copyright-protected before being sold [1][2][3]. Moreover, consumers also need privacy protection.…”
Section: Introductionmentioning
confidence: 99%
“…는 (k-1, k는 블록의 개수)의 부정자 추 적을 증명하였는데, 이는 사용자의 각 핑거프린팅 코드 사이에 존재하는 마킹가정 (Marking Assumption) [10] 을 이용하였다. Rhee는 [11] (1) ,w (2) ,...w (c) }⊂Γ으로 연합이라고 한다.…”
unclassified