Sciweavers

71 search results - page 6 / 15
» Communication-friendly encryption of multimedia
Sort
View
IEEEMSP
2002
IEEE
177views Multimedia» more  IEEEMSP 2002»
14 years 23 days ago
Data masking: a secure-covert channel paradigm
— It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypt...
Regunathan Radhakrishnan, Kulesh Shanmugasundaram,...
ISM
2006
IEEE
114views Multimedia» more  ISM 2006»
14 years 1 months ago
Mobile DRM-Enabled Multimedia Platform for Peer-to-Peer Applications
A mobile Digital Rights Management platform is proposed that follows the DRM reference architecture while including several important functions lacking in the OMA DRM. The platfor...
Mikko Löytynoja, Timo Koskela, Marko Brockman...
ICMCS
1999
IEEE
105views Multimedia» more  ICMCS 1999»
14 years 4 days ago
Key Independent Watermark Detection
Many types of pseudo-random signals have been used to embed signatures as watermarks, with spread spectrum signal techniques used to recover the signature from the encrypted data....
Ron G. van Schyndel, Andrew Z. Tirkel, Imants D. S...
TMM
2010
410views Management» more  TMM 2010»
13 years 2 months ago
On Energy Efficient Encryption for Video Streaming in Wireless Sensor Networks
Abstract--Selective encryption for video streaming was proposed for efficient multimedia content protection. However, the issues on joint optimization of video quality, content pro...
Wei Wang, Michael Hempel, Dongming Peng, Honggang ...
AVBPA
2005
Springer
275views Biometrics» more  AVBPA 2005»
14 years 1 months ago
Vulnerabilities in Biometric Encryption Systems
Abstract. The goal of a biometric encryption system is to embed a secret into a biometric template in a way that can only be decrypted with a biometric image from the enroled perso...
Andy Adler