Results 1 - 10
of
245
Anonymous buyer-seller watermarking protocol with additive homomorphism
- In Proc. of International Conference on Signal Processing and Multimedia Applications
, 2008
"... Abstract: Buyer-seller watermarking protocols integrate multimedia watermarking and fingerprinting with cryptogra-phy, for copyright protection, piracy tracing, and privacy protection. We propose an efficient buyer-seller watermarking protocol based on dynamic group signatures and additive homomorph ..."
Abstract
-
Cited by 5 (3 self)
- Add to MetaCart
homomorphism, to provide all the required security properties, namely traceability, anonymity, unlinkability, dispute resolution, non-framing, and non-repudiation. Another distinct feature is the improvement of the protocol’s utility, such that the double watermark insertion mechanism is avoided; the final
Robust mesh watermarking
- In: Proceedings of SIGGRAPH ’99
, 1999
"... We describe a robust method for watermarking triangle meshes. Watermarking provides a mechanism for copyright protection of digital media by embedding information identifying the owner in the data. The bulk of the research on digital watermarks has focused on media such as images, video, audio, and ..."
Abstract
-
Cited by 95 (0 self)
- Add to MetaCart
We describe a robust method for watermarking triangle meshes. Watermarking provides a mechanism for copyright protection of digital media by embedding information identifying the owner in the data. The bulk of the research on digital watermarks has focused on media such as images, video, audio
On Combining Watermarking with Perceptual Coding
- PROC. IEEE ICASSP
, 1998
"... A watermark is a data stream inserted into multimedia content. It contains information relevant to the ownership or authorized use of the content. A watermark which could be recovered without a priori knowledge of the identity of the content could be used by web search mechanisms to flag unauthorize ..."
Abstract
-
Cited by 14 (1 self)
- Add to MetaCart
A watermark is a data stream inserted into multimedia content. It contains information relevant to the ownership or authorized use of the content. A watermark which could be recovered without a priori knowledge of the identity of the content could be used by web search mechanisms to flag
Watermarking of Relational Databases with ith Emphasis on Re-watermarking Re watermarking Attack
"... The proliferation of internet-based application environments and outsourcing of relational databases have amplified the vulnerability to counterfeited ownership assertion and, thus, proving ownership rights on digital contents is immensely vital than ever. To achieve this several watermarking techni ..."
Abstract
- Add to MetaCart
techniques have proposed in recent past. But an attacker can launch a rewatermarking attack by inserting a new watermark in the already marked database; thus causing conflicting ownership claims by the legitimate data owner and the attacker. Only a few watermarking techniques provide mechanisms to combat
Abstract Robust Mesh Watermarking
"... We describe a robust method for watermarking triangle meshes. Watermarking provides a mechanism for copyright protection of digital media by embedding information identifying the owner in the data. The bulk of the research on digital watermarks has focused on media such as images, video, audio, and ..."
Abstract
- Add to MetaCart
We describe a robust method for watermarking triangle meshes. Watermarking provides a mechanism for copyright protection of digital media by embedding information identifying the owner in the data. The bulk of the research on digital watermarks has focused on media such as images, video, audio
Watermarking Relational Databases using Optimization Based Techniques
"... Abstract — Proving ownership rights on outsourced relational databases is a crucial issue in today internet-based application environments and in many content distribution applications. In this paper, we present a mechanism for proof of ownership based on the secure embedding of a robust imperceptib ..."
Abstract
-
Cited by 6 (0 self)
- Add to MetaCart
errors. We implemented a proof of concept implementation of our watermarking technique and showed by experimental results that our technique is resilient to tuple deletion, alteration and insertion attacks. Index Terms — Watermarking, Digital Rights, Optimization. I.
Watermarking of Dataset Using Usability Constraints Model
"... Abstract- In the emerging field of “Sharing Dataset ” with the deliberate recipients, protecting ownership on the datasets is becoming a challenge in itself. Watermarking is the commonly used mechanism to enforce and prove ownership for the digital data in different formats like text, database, soft ..."
Abstract
- Add to MetaCart
Abstract- In the emerging field of “Sharing Dataset ” with the deliberate recipients, protecting ownership on the datasets is becoming a challenge in itself. Watermarking is the commonly used mechanism to enforce and prove ownership for the digital data in different formats like text, database
Mu Insertions Are Repaired by the Double-Strand Break Repair Pathway of Escherichia coli
, 2012
"... Mu is both a transposable element and a temperate bacteriophage. During lytic growth, it amplifies its genome by replicative transposition. During infection, it integrates into the Escherichia coli chromosome through a mechanism not requiring extensive DNA replication. In the latter pathway, the tra ..."
Abstract
- Add to MetaCart
Keio Collection to screen for mutants defective in recovery of stable Mu insertions, we show in this study that the gaps are repaired by the machinery responsible for the repair of double-strand breaks in E. coli—the replication restart proteins PriA-DnaT and homologous recombination proteins Rec
Double Security Watermarking Algorithm for 3D Model using IEEE-754 Floating Point Arithmetic
"... Most of the fragile watermarking scheme authenticate the user but unable to locate the region of tampering. The objective of proposed scheme is not only maintaining the quality of watermark 3D object at its acceptable level but also identify the region of tampering. During the process of watermarkin ..."
Abstract
- Add to MetaCart
of watermarking embedding the normal distance of each vertex from center of mass is calculated and marked vertices are converted into IEEE-754 floating point representation in double precision. Cryptographic hash function is applied to find the mark vertices. The watermark is inserted in each of the segments of 3
ViWiD: Visible Watermarking based Defense
"... Abstract. In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks- a form of web based identity theft. ViWiD is an integrity check mechanism based on visible watermarking of logo images. ViWiD performs all of the computation on the company’s w ..."
Abstract
- Add to MetaCart
Abstract. In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks- a form of web based identity theft. ViWiD is an integrity check mechanism based on visible watermarking of logo images. ViWiD performs all of the computation on the company’s
Results 1 - 10
of
245