Sciweavers

68 search results - page 5 / 14
» Attacks and Forensic Analysis for Multimedia Content Protect...
Sort
View
ICIP
2006
IEEE
14 years 9 months ago
Selfish Colluder Detection and Identification in Traitors within Traitors
During collusion attacks against multimedia forensics, an important issue that colluders need to address is the fairness of the attack, i.e., whether all colluders take the same r...
H. Vicky Zhao, K. J. Ray Liu
CCS
2005
ACM
14 years 24 days ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
ICMCS
2008
IEEE
174views Multimedia» more  ICMCS 2008»
14 years 1 months ago
Blind motion-compensated video watermarking
The temporal correlation between adjacent video frames poses a severe challenges for video watermarking applications. Motioncoherent watermarking has been recognized as a strategy...
Peter Meerwald, Andreas Uhl
SMC
2007
IEEE
14 years 1 months ago
Improved collusion-secure codes for digital fingerprinting based on finite geometries
Abstract— Digital fingerprinting, a copyright protection technique for digital contents, is considered. Digital fingerprinting should deter collusion attacks, where several fi...
Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hiras...
MM
2004
ACM
107views Multimedia» more  MM 2004»
14 years 23 days ago
Collusion attack on a multi-key secure video proxy scheme
In ACM Multimedia’2002, a video proxy scheme was proposed for secure video delivery. In the scheme, a video is cached in proxies in encrypted form so that it remains nondisclose...
Yongdong Wu, Feng Bao