Sciweavers

68 search results - page 3 / 14
» Attacks and Forensic Analysis for Multimedia Content Protect...
Sort
View
APGV
2008
ACM
164views Visualization» more  APGV 2008»
13 years 9 months ago
Quantifying usability in secure graphics: assessing the user costs of protecting 3D content
There is an increasing need for methods for secure dissemination of interactive 3D graphics content, providing protection for valuable 3D models while still allowing them to be wi...
Jiajun Zhu, Jonathan Z. Bakdash, David Koller, Tho...
ICIP
2007
IEEE
14 years 9 months ago
Analysis of Nonlinear Collusion Attacks on Fingerprinting Systems for Compressed Multimedia
In this paper, we analyze the effect of various collusion attacks on fingerprinting systems for compressed multimedia. We evaluate the effectiveness of the collusion attacks in te...
Avinash L. Varna, Shan He, Ashwin Swaminathan, Min...
ARESEC
2011
76views more  ARESEC 2011»
12 years 7 months ago
A Complexity Based Forensic Analysis of the Trojan Horse Defence
—The Operational Complexity Model (OCM) has been used to derive the complexities of the five most prevalent cyber-crimes occurring in southeast Asia, namely peer-to-peer (P2P) mu...
Richard E. Overill, Jantje A. M. Silomon
SSWMC
2004
13 years 8 months ago
Collusion-resistant multimedia fingerprinting: a unified framework
Digital fingerprints are unique labels inserted in different copies of the same content before distribution. Each digital fingerprint is assigned to an intended recipient, and can...
Min Wu, Wade Trappe, Z. Jane Wang, K. J. Ray Liu
JIPS
2010
110views more  JIPS 2010»
13 years 2 months ago
A License Audit Model for Secure DRM Systems in IP-based Environments
Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by c...
Ui-Jin Jang, Hyung-Min Lim, Yong-Tae Shin