Results 1 - 10
of
181
Video Authentication and Copyright Protection using Unique Watermark Generation Technique and Singular Value Decomposition
"... Digital watermark is perceptually invisible information embedded in the video. This embedding is done by an encoder using a secret key. The watermark can carry information about owner or recipient of the video or the video itself or some additional information like video caption, date etc. The water ..."
Abstract
- Add to MetaCart
Digital watermark is perceptually invisible information embedded in the video. This embedding is done by an encoder using a secret key. The watermark can carry information about owner or recipient of the video or the video itself or some additional information like video caption, date etc
Watermarking Relational Databases
- In 28th Int’l Conference on Very Large Databases, Hong Kong
, 2002
"... We enunciate the need for watermarking database relations to deter their piracy, identify the unique characteristics of relational data which pose new challenges for watermarking, and provide desirable properties of a watermarking system for relational data. A watermark can be applied to any d ..."
Abstract
-
Cited by 111 (5 self)
- Add to MetaCart
We enunciate the need for watermarking database relations to deter their piracy, identify the unique characteristics of relational data which pose new challenges for watermarking, and provide desirable properties of a watermarking system for relational data. A watermark can be applied to any
A buyer-seller watermarking protocol
- IEEE Transactions on Image Processing
, 2001
"... Digital watermarks have recently been proposed for the purposes of copy protec-tion and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer sells unauthorized copies of t ..."
Abstract
-
Cited by 61 (1 self)
- Add to MetaCart
Digital watermarks have recently been proposed for the purposes of copy protec-tion and copy deterrence for multimedia content. In copy deterrence, a content owner (seller) inserts a unique watermark into a copy of the content before it is sold to a buyer. If the buyer sells unauthorized copies
Stones by Watermarking Methodology
"... Network based attacks have become a serious threat to the critical information infrastructure on which we depend.Identifying the source of the attackers behind the stepping stone(s), it is necessary to correlate the incoming and outgoing flows or connections of a stepping stone. To resist attempts a ..."
Abstract
- Add to MetaCart
unique watermark into the encrypted flows by slightly adjusting the timing of selected packets. The unique watermark that is embedded in the encrypted flow gives us a number of advantages over passive timing based correlation in resisting timing perturbations by the attacker.
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
"... Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet dropping, flow mixing, flow splitting, and flow merging to achieve anonymity. It has long been believed that these flow transforma ..."
Abstract
-
Cited by 77 (5 self)
- Add to MetaCart
. By injecting unique watermark into the inter-packet timing domain of a packet flow, we are able to make any sufficiently long flow uniquely identifiable even if 1) it is disguised by substantial amount of
Watermark Captioning for Images in E-Governance
"... Abstract — Watermarking is well known as a tool for copyright protection of documents. Digital watermarking is also useful for content authentication and tamper detection. Watermarking could be migrated to e-governance for enhancing security of various e-governance applications. Successful e-governa ..."
Abstract
- Add to MetaCart
-governance implementation requires all digital documents issued by the government is protected from illegal attacks attempting to modify the original contents. This paper proposes a method for uniquely watermarking images, including photographs and biometric images collected from the public by various government agencies
8 Watermark Attacks And Applications in Watermarking
"... Digital watermarking of multimedia content has become a very active research area over the last several years. Digital watermarking is the process of embedding watermark into a digital signal. A digital watermark is a digital signal or pattern inserted into a digital document and carries information ..."
Abstract
- Add to MetaCart
information unique to the copyright owner, the creator of the document or the authorized consumer. This paper presents various watermark attack. Watermark attack is any processing (ability of unauthorized users) that may remove, detect and estimate, write or modify the raw watermarking bits (watermark
A watermarking algorithm for fingerprinting Intelligence images
- John Hopkins University
"... Abstract — The rapid growth of digital multimedia technologies brings tremendous attention to the field of digital watermarking. One application for digital watermarking is fingerprinting. The owner or the distributor of the multimedia data can insert unique watermarks into copies for different cust ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Abstract — The rapid growth of digital multimedia technologies brings tremendous attention to the field of digital watermarking. One application for digital watermarking is fingerprinting. The owner or the distributor of the multimedia data can insert unique watermarks into copies for different
Large Scale Distributed Watermarking Of Multicast Media Through Encryption
- IN PROC. IFIP INT. CONF. COMMUNICATIONS AND MULTIMEDIA SECURITY ISSUES OF THE NEW CENTURY
, 2001
"... In this paper we describe a scheme in which each receiver of a multicast session receives a stream with a different, unique watermark, while still retaining the scalability of multicast. The watermarked streams can be used to trace those users who make unauthorized copies of a stream. The watermarki ..."
Abstract
-
Cited by 13 (0 self)
- Add to MetaCart
In this paper we describe a scheme in which each receiver of a multicast session receives a stream with a different, unique watermark, while still retaining the scalability of multicast. The watermarked streams can be used to trace those users who make unauthorized copies of a stream
Image Watermarking Techniques in Spatial Domain: A Review
"... The rapid growth of digital multimedia technologies brings tremendous attention to the field of digital watermarking. The owner or the distributor of the digital images can insert unique watermark into copies for different customers or receivers, which will be helpful to identify the source of illeg ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
The rapid growth of digital multimedia technologies brings tremendous attention to the field of digital watermarking. The owner or the distributor of the digital images can insert unique watermark into copies for different customers or receivers, which will be helpful to identify the source
Results 1 - 10
of
181