参考文献 [ 1 ] 胡德发. 非对称数字指纹技术研究[D]. 长沙:湖南大学,2010. [ 2 ] Cheng Minquan,Miao Ying. On Anti-collusion Codes and Detection Algorithms for Multimedia Fingerprinting [J]. IEEE Transactions on Information Theory,2011,57(7): 4843-4851. [ 3 ] Wagner N R. Fingerprinting[C] / / Proceedings of IEEE Symposium on Security and Piracy. Oakland,USA:IEEE Computer Society,1983:18-22. [ 4 ] Blakley G R, Meadows C, Purdy G B. Fingerprinting Long Forgiving Messages[C]/ / Proceedings of Crypto’85. Berlin,Germany:Springer,1986:180-189. [ 5 ] Boneh D, Shaw J. Collusion-secure Fingerprinting for Digital Data [ J ]. IEEE Transactions on Information Theory,1998,44(5):1897-1905. [ 6 ] Li Qiaoliang, Wang Xiaoming, Li Yingshu, et al. Construction of Anti-collusion Codes Based on Coverfree Families[C] / / Proceedings of the 6th International Conference on Information Technology:New Generations. Washington D. C. ,USA:IEEE Press,2009:362-365. [ 7 ] Stamm M C, Wu Min, Liu K J R. Information Forensics:An Overview of the First Decade [J]. IEEE Access,2013,1:167-200. [ 8 ] Karst N J,Wicker S B. On the Rekeying Load in Group Key Distributions Using Cover-free Families [J]. IEEE Transactions on Information Theory, 2012, 58 (10): 6667-6671. [ 9 ] 张 玲,李乔良,胡德发. 一种扩展的抗合谋数字指纹方案[J]. 计算机工程与应用,2012,48(1):128-131. [10] 程格平,袁 磊,魏希三. 基于量化索引调制的抗共谋指纹改进方案[ J ]. 计算机工程, 2012, 38 (12): 102-104. [11] 谢建全,黄大足,谢 勍. 基于RSA 公钥体制的非对称数字指纹协议[ J ]. 小型微型计算机系统,2013, 34(11):2542-2545. [12] 李启南,李 娇,武 让. 基于双重零水印的数据库版权保护[J]. 计算机工程,2012,38(8):107-110. 编辑 陆燕菲 |