Sciweavers

384 search results - page 31 / 77
» A Survey of Watermarking Security
Sort
View
CCS
2007
ACM
14 years 1 months ago
Towards a taxonomy for information security metrics
Systematic approaches to measuring security are needed in order to obtain evidence of the security performance of products or an organization. In this study we survey the emerging...
Reijo Savola
ACSAC
2001
IEEE
13 years 11 months ago
Enabling Hierarchical and Bulk-Distribution for Watermarked Content
One of the solutions to deter copyright violations consists of embedding hard to detect watermarks in digital media. Current developments have focused on how to embed watermarks, ...
Germano Caronni, Christoph L. Schuba
ICIP
2003
IEEE
14 years 9 months ago
Dither-based secure image hashing using distributed coding
We propose an image hashing algorithm that is based on distributed compression principles. The algorithm assumes the availability of a robust feature vector extracted from the ima...
Mark Johnson, Kannan Ramchandran
DEXAW
2005
IEEE
164views Database» more  DEXAW 2005»
14 years 1 months ago
Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms
This paper addresses the specification of security modules in a Mobile Digital Rights Management (DRM) approach with a focus on copy detection mechanisms. The presented DRM approa...
Miguel Soriano, Stephan Flake, Jürgen Tacken,...
ETRICS
2006
13 years 11 months ago
Visual Document Authentication Using Human-Recognizable Watermarks
Digital signatures and message authentication codes are well known methods for ensuring message integrity. However, they rely on computations which are too hard to be performed by ...
Igor Fischer, Thorsten Herfet