[图书][B] Multimedia security handbook

B Furht, D Kirovski - 2004 - books.google.com
Intellectual property owners who exploit new ways of reproducing, distributing, and
marketing their creations digitally must also protect them from piracy. Multimedia Security …

Watermarking is not cryptography

IJ Cox, G Doërr, T Furon - International Workshop on Digital Watermarking, 2006 - Springer
A number of analogies to cryptographic concepts have been made about watermarking. In
this paper, we argue that these analogies are misleading or incorrect, and highlight several …

Quality-optimized and secure end-to-end authentication for media delivery

Q Sun, J Apostolopoulos, CW Chen… - Proceedings of the …, 2007 - ieeexplore.ieee.org
The need for security services, such as confidentiality and authentication, has become one
of the major concerns in multimedia communication applications, such as video on demand …

An optimized content-aware authentication scheme for streaming JPEG-2000 images over lossy networks

Z Zhang, Q Sun, WC Wong… - IEEE Transactions …, 2007 - ieeexplore.ieee.org
This paper proposes an optimized content-aware authentication scheme for JPEG-2000
streams over lossy networks, where a received packet is consumed only when it is both …

Design of a robust and secure digital signature scheme for image authentication over wireless channels

SM Saad - IET Information Security, 2009 - IET
The introduction of 3G wireless communication systems, together with the invasive
distribution of digital images and the growing concern on their originality triggers an …

Error resilient content-based image authentication over wireless channel

S Ye, Q Sun, EC Chang - 2005 IEEE International Symposium …, 2005 - ieeexplore.ieee.org
The pervasive distribution of digital images triggers an emergent need for authenticating
degraded images by lossy compression and transmission. This paper proposes a robust …

Homomorphic signatures for digital photographs

R Johnson, L Walsh, M Lamb - International Conference on Financial …, 2011 - Springer
We describe two homomorphic signature schemes for digital photographs such that an
intermediate party in possession of a signed photograph can construct a scaled, cropped …

Image feature based authentication and digital signature for wireless data transmission

M Ziaullah, P Shetty, S Kamal - 2016 International Conference …, 2016 - ieeexplore.ieee.org
Wireless security data is one of the challenges in wireless network. Because of the less and
weak authentication and frequently changes, strong security mechanism are difficult to …

Statistics-and spatiality-based feature distance measure for error resilient image authentication

S Ye, Q Sun, EC Chang - Transactions on Data Hiding and Multimedia …, 2007 - Springer
Content-based image authentication typically assesses authenticity based on a distance
measure between the image to be tested and its original. Commonly employed distance …

Graph-based authentication design for color-depth-based 3D video transmission over wireless networks

Y Wang, H Wang, C Wang - IEEE Transactions on Network and …, 2013 - ieeexplore.ieee.org
3D video applications such as 3D-TV and 3D games have become more and more popular
in recent years. These applications raised significant challenges in the media security …