[图书][B] Multimedia security handbook
B Furht, D Kirovski - 2004 - books.google.com
Intellectual property owners who exploit new ways of reproducing, distributing, and
marketing their creations digitally must also protect them from piracy. Multimedia Security …
marketing their creations digitally must also protect them from piracy. Multimedia Security …
Watermarking is not cryptography
A number of analogies to cryptographic concepts have been made about watermarking. In
this paper, we argue that these analogies are misleading or incorrect, and highlight several …
this paper, we argue that these analogies are misleading or incorrect, and highlight several …
Quality-optimized and secure end-to-end authentication for media delivery
Q Sun, J Apostolopoulos, CW Chen… - Proceedings of the …, 2007 - ieeexplore.ieee.org
The need for security services, such as confidentiality and authentication, has become one
of the major concerns in multimedia communication applications, such as video on demand …
of the major concerns in multimedia communication applications, such as video on demand …
An optimized content-aware authentication scheme for streaming JPEG-2000 images over lossy networks
Z Zhang, Q Sun, WC Wong… - IEEE Transactions …, 2007 - ieeexplore.ieee.org
This paper proposes an optimized content-aware authentication scheme for JPEG-2000
streams over lossy networks, where a received packet is consumed only when it is both …
streams over lossy networks, where a received packet is consumed only when it is both …
Design of a robust and secure digital signature scheme for image authentication over wireless channels
SM Saad - IET Information Security, 2009 - IET
The introduction of 3G wireless communication systems, together with the invasive
distribution of digital images and the growing concern on their originality triggers an …
distribution of digital images and the growing concern on their originality triggers an …
Error resilient content-based image authentication over wireless channel
The pervasive distribution of digital images triggers an emergent need for authenticating
degraded images by lossy compression and transmission. This paper proposes a robust …
degraded images by lossy compression and transmission. This paper proposes a robust …
Homomorphic signatures for digital photographs
We describe two homomorphic signature schemes for digital photographs such that an
intermediate party in possession of a signed photograph can construct a scaled, cropped …
intermediate party in possession of a signed photograph can construct a scaled, cropped …
Image feature based authentication and digital signature for wireless data transmission
Wireless security data is one of the challenges in wireless network. Because of the less and
weak authentication and frequently changes, strong security mechanism are difficult to …
weak authentication and frequently changes, strong security mechanism are difficult to …
Statistics-and spatiality-based feature distance measure for error resilient image authentication
Content-based image authentication typically assesses authenticity based on a distance
measure between the image to be tested and its original. Commonly employed distance …
measure between the image to be tested and its original. Commonly employed distance …
Graph-based authentication design for color-depth-based 3D video transmission over wireless networks
Y Wang, H Wang, C Wang - IEEE Transactions on Network and …, 2013 - ieeexplore.ieee.org
3D video applications such as 3D-TV and 3D games have become more and more popular
in recent years. These applications raised significant challenges in the media security …
in recent years. These applications raised significant challenges in the media security …