Sciweavers

110 search results - page 7 / 22
» Security Evaluation Of Informed Watermarking Schemes
Sort
View
ICIP
2005
IEEE
14 years 10 months ago
Hiding privacy information in video surveillance system
This paper proposes a detailed framework of storing privacy information in surveillance video as a watermark. Authorized personnel is not only removed from the surveillance video ...
Wei Zhang, Sen-Ching S. Cheung, Minghua Chen
IH
2007
Springer
14 years 2 months ago
Security of Invertible Media Authentication Schemes Revisited
Abstract. Dittmann, Katzenbeisser, Schallhart and Veith (IACR ePrint 2004) introduced the notion of invertible media authentication schemes, embedding authentication data in media ...
Daniel Dönigus, Stefan Endler, Marc Fischlin,...
ICITS
2009
13 years 6 months ago
On the Security of Pseudorandomized Information-Theoretically Secure Schemes
In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which replaces the required perfect randomness with output distribution of a computat...
Koji Nuida, Goichiro Hanaoka
DATE
2005
IEEE
149views Hardware» more  DATE 2005»
14 years 2 months ago
A Public-Key Watermarking Technique for IP Designs
— Sharing IP blocks in today’s competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illeg...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
DRM
2008
Springer
13 years 10 months ago
A decision theoretic framework for analyzing binary hash-based content identification systems
Content identification has many applications, ranging from preventing illegal sharing of copyrighted content on video sharing websites, to automatic identification and tagging of ...
Avinash L. Varna, Ashwin Swaminathan, Min Wu