Sciweavers

356 search results - page 70 / 72
» Foveated image watermarking
Sort
View
ICIP
2006
IEEE
14 years 11 months ago
Robust Signature-Based Geometric Invariant Copyright Protection
The most significant bit (MSB)-plane of an image is least likely to change by the most signal processing operations. Watermarking techniques are, however, unable to exploit the MS...
Mohammad Awrangjeb, M. Manzur Murshed
IH
2007
Springer
14 years 4 months ago
Exploiting Security Holes in Lattice Data Hiding
Abstract. This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantiï¬...
Luis Pérez-Freire, Fernando Pérez-Go...
ICIP
2002
IEEE
14 years 11 months ago
Anti-collusion codes: multi-user and multimedia perspectives
Digital fingerprinting is an effective method to identify users who might try to redistribute multimedia content, such as images and video. These fingerprints are typically embedd...
Wade Trappe, Min Wu, K. J. Ray Liu
ICIP
2008
IEEE
14 years 4 months ago
On the security of non-forgeable robust hash functions
In many applications, it is often desirable to extract a consistent key from a multimedia object (e.g., an image), even when the object has gone through a noisy channel. For examp...
Qiming Li, Sujoy Roy
ICIP
2009
IEEE
14 years 10 months ago
Selective And Scalable Encryption Of Enhancement Layers For Dyadic Scalable H.264/avc By Scrambling Of Scan Patterns
This paper presents a new selective and scalable encryption (SSE) method for intra dyadic scalable coding framework based on wavelet/subband (DWTSB) for H.264/AVC. It has been ach...