— It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypt...
A mobile Digital Rights Management platform is proposed that follows the DRM reference architecture while including several important functions lacking in the OMA DRM. The platfor...
Many types of pseudo-random signals have been used to embed signatures as watermarks, with spread spectrum signal techniques used to recover the signature from the encrypted data....
Ron G. van Schyndel, Andrew Z. Tirkel, Imants D. S...
Abstract--Selective encryption for video streaming was proposed for efficient multimedia content protection. However, the issues on joint optimization of video quality, content pro...
Wei Wang, Michael Hempel, Dongming Peng, Honggang ...
Abstract. The goal of a biometric encryption system is to embed a secret into a biometric template in a way that can only be decrypted with a biometric image from the enroled perso...