Seventeenth Annual Computer Security Applications Conference
DOI: 10.1109/acsac.2001.991543
|View full text |Cite
|
Sign up to set email alerts
|

Enabling hierarchical and bulk-distribution for watermarked content

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
2
0

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 10 publications
1
2
0
Order By: Relevance
“…From their reported results, for a two hour video distributed to 10 000 users, only when no more than three users colluded could their system detect at least one colluder correctly with probability 0.9. Similar work was presented in [9]- [11].…”
supporting
confidence: 69%
“…From their reported results, for a two hour video distributed to 10 000 users, only when no more than three users colluded could their system detect at least one colluder correctly with probability 0.9. Similar work was presented in [9]- [11].…”
supporting
confidence: 69%
“…• Hierarchical tagging and bulk tagging [58]: hierarchical tagging allows an artist to insert a different watermark for each of his distributors. Similarly, each distributor can insert a watermark for several sub-distributors.…”
Section: Watermarkingmentioning
confidence: 99%
“…The disadvantage is that this approach requires network infrastructure support, which may not be available in many networks. Other techniques are mentioned in [129] and [130].…”
Section: Key Management and Delivery Network Issuesmentioning
confidence: 99%