[HTML][HTML] A secure and robust compressed domain video steganography for intra-and inter-frames using embedding-based byte differencing (EBBD) scheme
This paper presents a novel secure and robust steganographic technique in the compressed
video domain namely embedding-based byte differencing (EBBD). Unlike most of the …
video domain namely embedding-based byte differencing (EBBD). Unlike most of the …
Effect of trigonometric functions-based watermarking on blood vessel extraction: an application in ophthalmology imaging
N Dey, SS Ahmed, S Chakraborty… - International …, 2017 - inderscienceonline.com
With the growth of globalisation, security has been a major concern in digital exchange of
medical information. Data hiding, also referred as watermarking, was introduced to …
medical information. Data hiding, also referred as watermarking, was introduced to …
Multi-layer watermarking of H. 264/AVC video using Differential Expansion on IPCM blocks
MA Ali, EA Edirisinghe - 2011 IEEE International Conference …, 2011 - ieeexplore.ieee.org
This article proposes a reversible high-capacity watermarking algorithm for the H. 264/AVC
video standard. The technique applies the concept of Differential Expansion (DE) on the …
video standard. The technique applies the concept of Differential Expansion (DE) on the …
Improved watermark payload capacity using DE on IPCM macroblocks in H. 264/AVC
MA Ali, EA Edirisinghe - 5th International Conference on …, 2010 - ieeexplore.ieee.org
This paper proposes a reversible watermarking technique that utilizes the IPCM
macroblocks generated by the H. 264/AVC encoder. The technique applies the concept of …
macroblocks generated by the H. 264/AVC encoder. The technique applies the concept of …
[PDF][PDF] Digital rights management techniques for H. 264 video
MA Ali - 2011 - core.ac.uk
This work aims to present a number of low-complexity digital rights management (DRM)
methodologies for the H. 264 standard. Initially, requirements to enforce DRM are analyzed …
methodologies for the H. 264 standard. Initially, requirements to enforce DRM are analyzed …