• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 16,092
Next 10 →

Collusion-Resistant Fingerprinting for Multimedia

by Min Wu, Wade Trappe, Z. Jane Wang, K. J. Ray Liu , 2004
"... A broad overview of the recent advances in multimedia fingerprinting for tracing and identifying colluders. Ensuring that digital content is used for its intended purpose after it has been delivered to customers often requires the ability to track and identify entities involved in unauthorized redis ..."
Abstract - Cited by 27 (2 self) - Add to MetaCart
. It is desirable, therefore, to design fingerprints that resist collusion and identify the colluders.

Data Mining and Collusion Resistance

by Samuel Shepard, Ray Kresman, Larry Dunning
"... Abstract—The field of data mining provides techniques for new knowledge discovery—finding patterns in the data set such as classifiers and association rules that may be useful to the data miner. Privacy preserving data mining seeks to allow users to share data while ensuring individual and corporate ..."
Abstract - Add to MetaCart
Abstract—The field of data mining provides techniques for new knowledge discovery—finding patterns in the data set such as classifiers and association rules that may be useful to the data miner. Privacy preserving data mining seeks to allow users to share data while ensuring individual and corporate privacy concerns are addressed. Recently algorithms have been introduced to maintain privacy even when all but two parties collude. This paper builds upon previous algorithms, putting cycle-partitioned secure sum into the mathematical framework of edge-disjoint Hamiltonian cycles. I.

Collusion-resistant for multimedia

by Chuan Wu, Baochun Li, Shuqiao Zhao - IEEE International Conference on Acoustics, Speech, and Signal Processing , 2002
"... Abstract—The fundamental advantage of peer-to-peer (P2P) multimedia streaming applications is to leverage peer upload capacities to minimize bandwidth costs on dedicated streaming servers. The available bandwidth among peers is of pivotal importance to P2P streaming applications, especially as the n ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract—The fundamental advantage of peer-to-peer (P2P) multimedia streaming applications is to leverage peer upload capacities to minimize bandwidth costs on dedicated streaming servers. The available bandwidth among peers is of pivotal importance to P2P streaming applications, especially as the number of peers in the streaming session reaches a very large scale. In this paper, we utilize more than 230 GB of traces collected from a commercial P2P streaming system, UUSee, over a four-month period of time. With such traces, we seek to thoroughly understand and characterize the achievable bandwidth of streaming flows among peers in large-scale real-world P2P live streaming sessions, in order to derive useful insights towards the improvement of current-generation P2P streaming protocols, such as peer selection. Using continuous traces over a long period of time, we explore evolutionary properties of inter-peer bandwidth. Focusing on representative snapshots of the entire topology at specific times, we investigate distributions of interpeer bandwidth in various peer ISP/area/type categories, and statistically test and model the deciding factors that cause the variance of such inter-peer bandwidth. Our original discoveries in this study include: (1) The ISPs that peers belong to are more correlated to inter-peer bandwidth than their geographic locations; (2) There exist excellent linear correlations between peer last-mile bandwidth availability and inter-peer bandwidth within the same ISP, and between a subset of ISPs as well; and (3) The evolution of inter-peer bandwidth between two ISPs exhibits daily variation patterns. Based on these insights, we design a throughput expectation index that facilitates highbandwidth peer selection without performing any measurements.

Optimal collusion-resistant mechanisms with verification

by Paolo Penna, Carmine Ventre , 2007
"... We study the so called mechanisms with verification introduced by Nisan and Ronen [1999]. We show that these mechanisms can optimize any “reasonable ” cost function and that they can be resistant to any coalition of colluding agents in the strongest model which allows agents to exchange side payment ..."
Abstract - Cited by 10 (1 self) - Add to MetaCart
. By contrast, no truthful mechanism without verification can achieve such an approximation ratio. Moreover, every mechanism without verification which is collusion-resistant must have an unbounded approximation factor.

A family of collusion resistant protocols for instantiating security

by Sandeep S. Kulkarni, Bruhadeshwar Bezawada - Proc. of the 13th IEEE International Conference on Network Protocols (ICNP
"... In this paper, we focus on the problem of identifying a family of collusion resistant protocols that demonstrate a tradeoff between the number of secrets that users maintain and the extent of collusion resistance. Towards this end, we define classes of collusion resistant protocols (modeled along th ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
In this paper, we focus on the problem of identifying a family of collusion resistant protocols that demonstrate a tradeoff between the number of secrets that users maintain and the extent of collusion resistance. Towards this end, we define classes of collusion resistant protocols (modeled along

Collusion resistant broadcast encryption with short ciphertexts and private keys

by Dan Boneh, Craig Gentry, Brent Waters
"... We describe two new public key broadcast encryption systems for stateless receivers. Both systems are fully secure against any number of colluders. In our first construction both ciphertexts and private keys are of constant size (only two group elements), for any subset of receivers. The public ke ..."
Abstract - Cited by 190 (19 self) - Add to MetaCart
key size in this system is linear in the total number of receivers. Our second system is a generalization of the first that provides a tradeoff between ciphertext size and public key size. For example, we achieve a collusion resistant broadcast system for n users where both ciphertexts and public keys

Statistical Invisibility for Collusion-resistant Digital Video Watermarking

by Karen Su, Student Member, Deepa Kundur, Senior Member, Dimitrios Hatzinakos, Senior Member - IEEE Trans. Multimedia , 2005
"... Abstract—In this paper, we present a theoretical framework for the linear collusion analysis of watermarked digital video sequences, and derive a new theorem equating a definition of statistical invisibility, collusion-resistance, and two practical watermark design rules. The proposed framework is s ..."
Abstract - Cited by 28 (3 self) - Add to MetaCart
Abstract—In this paper, we present a theoretical framework for the linear collusion analysis of watermarked digital video sequences, and derive a new theorem equating a definition of statistical invisibility, collusion-resistance, and two practical watermark design rules. The proposed framework

Collusion Resistant Fingerprinting In DCT Domain

by Eep Kaur, Sukhjeet K. Ranade, Megha Kansal
"... Digital fingerprinting is a technique for identifying users who use multimedia content for unintended purposes, such as redistribution. These fingerprints are typically embedded into the content using watermarking techniques that are designed to be robust to a variety of attacks. A cost-effective at ..."
Abstract - Add to MetaCart
-effective attack against such digital fingerprints is collusion, where several differently marked copies of the same content are combined to disrupt the underlying fingerprints. Anti-Collusion Codes (ACCs) are employed to design the fingerprints, which can accommodate more users than orthogonal modulation based

A Note on the Limits of Collusion-Resistant

by Funda Ergun, Joe Kilian, Ravi Kumar
"... Abstract. In one proposed use of digital watermarks, the owner of a document D sells slightly different documents, D1; D2; : : : to each buyer; if a buyer posts his/her document Di to the web, the owner can identify the source of the leak. More general attacks are however possible in which k buyers ..."
Abstract - Add to MetaCart
Abstract. In one proposed use of digital watermarks, the owner of a document D sells slightly different documents, D1; D2; : : : to each buyer; if a buyer posts his/her document Di to the web, the owner can identify the source of the leak. More general attacks are however possible in which k buyers create some composite document D \Lambda; the goal of the owner is

Collusion Resistance of Digital Fingerprinting Schemes

by T. U. Vladimirova
"... A digital fingerprint is user-specific information that is added in each copy of distributed digital data. The fingerprint should not be noticeable to the user. It is used to trace illegal distributing of data. Should the user illegally distribute his copy, the fingerprint in this copy will trace ba ..."
Abstract - Add to MetaCart
back to him. In this work we consider fingerprints that are resistant against collusion attacks. In a collusion attack malicious users compare their copies of data in order to detect the positions of the fingerprints. They alter the detected symbols in order to generate a new copy. This new copy
Next 10 →
Results 1 - 10 of 16,092
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University