How to protect multimedia pieces of content, from their creation to their distribution, 2011. ,
A survey on digital tracing traitors schemes, 9th International Conference on Information Assurance and Security, IAS 2013, pp.85-90, 2013. ,
Design and analysis of high-capacity anti-collusion hiding codes, Circuits, Systems & Signal Processing, vol.27, pp.195-211, 2008. ,
Robust parent-identifying codes and combinatorial arrays, IEEE Transactions on Information Theory, vol.59, issue.2, pp.994-1003, 2013. ,
Collusion-secure fingerprinting for digital data, IEEE Transactions on Information Theory, vol.44, issue.5, pp.1897-1905, 1998. ,
Optimal probabilistic fingerprint codes, STOC, pp.116-125, 2003. ,
Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes, IACR Cryptology ePrint Archive, p.41, 2007. ,
Hierarchical construction of Tardos code, Information Theory and Its Applications, pp.1-6, 2008. ,
Systematic generation of Tardos's fingerprint codes, IEICE Transactions, vol.93, issue.2, pp.508-515, 2010. ,
Fast detection of Tardos codes with boneh-shaw types, Proc. SPIE 8303, Media Watermarking, Security, and Forensics, 2012. ,
Dct based blind audio watermarking scheme, SIGMAP, pp.139-144, 2010. ,
, 23rd European Signal Processing Conference