Filters








15,602 Hits in 5.0 sec

for DDoS Attacks using NS-2 A New Collusion Attack Using Interpolation for Multimedia Fingerprinting

Conghuan Ye, Zenggang Xiong, Yaoming Ding, Guangwei Wang, Fang Xu
2016 International Journal of Security and Its Applications  
With different fingerprinted copies, collusion attack can produce a new colluded fingerprinted copy for get rid of the fingerprint information from the colluded copy, so digital fingerprinting technique  ...  The proposed interpolation collusion attack scheme comes from the idea of image fusion.  ...  to methods of constructing a new image from a corresponding original image sequence.  ... 
doi:10.14257/ijsia.2016.10.5.14 fatcat:4c3e734wvbaphfftgfbp3cvogi

A Multi-purpose Dual Watermarking Scheme

Jobin Abraham
2013 International Journal of Computer Applications  
For fingerprinting images, an ID number or a unique code pertaining to the buyer is hidden with in the digital resources at the time of resource transfer.  ...  For copyright protection of the resource, a unique signature such as a logo of the owner creator is integrated imperceptibly.  ...  CONCLUSION A novel watermarking scheme for dual purpose of copyright protection and fingerprinting digital images is proposed.  ... 
doi:10.5120/13411-1066 fatcat:qpd7owj2cff73opxgd6vqr7psy

LSB HIDING USING RANDOM APPROACH FOR IMAGE WATERMARKING

Mayuri Verma .
2014 International Journal of Research in Engineering and Technology  
protection for intellectual property from illegal copying.  ...  A digital image watermarking is the process of embedding an image with a secondary parameter called watermark, without deterioration in the quality of image to provide copyright protection means to provide  ...  Thus the, content owners see a high risk of piracy and concern about the protection of their intellectual property from illegal copying. Copyright protection of such data is an important issue.  ... 
doi:10.15623/ijret.2014.0302110 fatcat:k3dgtabr75asphgcjx3g5jkoyu

Secure Multimedia Content Distribution for M2M Communication

Conghuan Ye, Zenggang Xiong, Yaoming Ding, Xuemin Zhang, Guangwei Wang, Fang Xu
2016 International Journal of Security and Its Applications  
Multimedia encryption is used to encrypt multimedia content firstly before distribution, then, Copy detection is used to verify whether a protected multimedia content is a redistributed copy of its or  ...  no, At last, digital fingerprinting is introduced to protect multimedia content further.  ...  Concerned about the consequences of piracy of multimedia data, owners are interested in encryption, digital watermarking, and multimedia authentication which can protect their content from illegal use  ... 
doi:10.14257/ijsia.2016.10.4.26 fatcat:dsqd7cgmwrcapa2komozfgy4la

Watermarking Schemes For Copy Protection : A Survey

Dolley Shukla
2012 International Journal of Computer Science & Engineering Survey  
DIGITAL WATERMARKING  ...  Digital watermarking is a technique that proffers a means to guard digital images from illegal copying and manipulation.  ...  This system broadly tries to prevent illicit copies from being made from either the analog or digital I/O channels of DVD recorders.  ... 
doi:10.5121/ijcses.2012.3106 fatcat:o7wrj4glunaefckwi25zqrx7zy

Some general methods for tampering with watermarks

I.J. Cox, J.-P.M.G. Linnartz
1998 IEEE Journal on Selected Areas in Communications  
Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes.  ...  In such a scenario, it is important that the watermark survive both normal signal transformations and attempts to remove the watermark so that an illegal copy can be made.  ...  Kilian for many useful discussions and comments.  ... 
doi:10.1109/49.668980 fatcat:xvcpnq3azbg2dbg7uyfjol4ztq

The "ticket" concept for copy control based on embedded signalling [chapter]

J. P. M. G. Linnartz
1998 Lecture Notes in Computer Science  
The concept is part of a proposal currently under investigation for standardization of DVD / CPTWG copy control.  ...  Although the ticket shows similarities with a digital signature, there are essential differences.  ...  The first aim of copy protection schemes is to prevent illegal copies from being made.  ... 
doi:10.1007/bfb0055868 fatcat:r4ghmpmh6rc4za6zezieytt65q

A Study on Implementation and Service of Digital Watermark Technology Architecture for Distribution Management [chapter]

Manabu Hirakawa
2011 Designing and Deploying RFID Applications  
However, I believe that a societal system for preventing such problems is lacking, and a fundamental reason for this may be a gap in perspective at the business management level with respect to the low-cost  ...  As can be seen from these examples, consumers' trust, especially in regard to food safety, is at risk of being damaged.  ...  By embedding copy control information into digital watermarks, which are robust against digital disturbances, it is possible to construct a copyright protection system that can prevent illegal copying.  ... 
doi:10.5772/17514 fatcat:l5e5z6u2x5fnhd5qleygfsdz4q

Recursive Chaotic Desynchronized Fingerprint for Large Scale Distribution Using Social Network Analysis

Cong-huan Ye, Zeng-gang Xiong, Yao-Ming Ding, Xueming Zhang, Guangwei Wang, Fang Xu
2016 International Journal of Multimedia and Ubiquitous Engineering  
Average collusion attack is a very effective attack for digital fingerprinting system. Moreover, the commercial value of the colluded content is often time-sensitive.  ...  The more profit the colluder will make from it when the colluded copy is distributed earlier.  ...  Digital fingerprinting can be used to identify devices which use multimedia copy for illegal purposes.  ... 
doi:10.14257/ijmue.2016.11.7.31 fatcat:36rpn4zxdnbuxghiklj6qmj3hq

Digital Image Watermarking: A Study on Techniques & Issues

Jobin Abraham
2015 International Journal of Scientific and Engineering Research  
Watermarking is an effective method for restricting abuses of published digital contents and to protect ownership rights of the owner.  ...  Digital data can be easily copied and modified to create duplicate copies. These modified images are then redistributed through the Internet.  ...  The use IJSER ISSN 2229-5518 IJSER © 2015 http://www.ijser.org of Watermarking does not ensure that our digital data is protected from being copied and edited.  ... 
doi:10.14299/ijser.2015.12.010 fatcat:ad7e6rx7gjfwnp6hs5w5ybpnv4

A Secure Fingerprinted Multimedia Distribution Using Social Network Analysis

Cong-huan Ye, Zeng-gang Xiong, Yao-ming Ding, Xueming Zhang, Guangwei Wang, Fang Xu
2016 International Journal of Security and Its Applications  
Collusion attack is a very effective attack for digital fingerprinting system.  ...  Digital watermarking can be used to protect ownership, copyright authentication, and digital fingerprinting [17] .  ...  There are other measures such as image encryption, image hash, copy detection, and information hiding to protect multimedia content from illegal use.  ... 
doi:10.14257/ijsia.2016.10.4.20 fatcat:7mq7qn3tqvdltnousokjvhbscm

Speeding up the Detection of Line Drawings Using a Hash Table

Weihan Sun, Koichi Kise
2009 2009 Chinese Conference on Pattern Recognition  
Therefore, in the case of line drawings, copyright protection method should also be available for handwritten copies.  ...  Although a method applicable to handwritten copy detection has been proposed, its processing is time-consuming since it is based on matching a large number of local features extracted from images.  ...  ACKNOWLEDGEMENTS This work was supported in part by the Grant-in-Aid for Scientific Research (B)(19300062) from Japan Society for the Promotion of Science(JSPS).  ... 
doi:10.1109/ccpr.2009.5343969 fatcat:ax6a2wvdjzcnpp5gbb6stw5doy

Use of both Invisible and Emergable Watermarks to Deter Illegal Copying of Images

Takaaki Yamada
2013 Procedia Computer Science  
A method has thus been developed in which frequency filtering is used to divide the content into two types of region, one for embedding an emergable watermark and one for embedding invisible one.  ...  Emergable watermarks become visible in content that has been copied under designated conditions so that their use should deter illegal copying.  ...  Introduction Digital watermarking, which helps protect digital content against illegal reproduction and distribution by embedding information into it, is one countermeasure against illegal copying.  ... 
doi:10.1016/j.procs.2013.09.118 fatcat:cs36srjygjhr5inmyqdinmjpri

Safeguarding the Digital Contents: Digital Watermarking
English

M. Natarajan, Gayas Makhdumi
2009 DESIDOC Journal of Library & Information Technology  
It has been concluded that the protection of individual rights is a must, and deeper understanding of the DWM will lead to the design of more reliable systems for safe-guarding digital contents.  ...  Digital watermarks are one of the tools which helps to make the distribution of digital material more secure. It is a kind of digital signal or pattern hidden directly in digital content.  ...  Because of the massive illegal copying of media files, content owners utilise various protection technologies like digital rights management (DRM) and/or digital watermarking.  ... 
doi:10.14429/djlit.29.249 fatcat:wo24xv5t4rczdcbiphwgiqtvfy

Mobile Services and Implementation of Digital Watermarks in Audio Files

Manabu Hirakawa, Junichi Iijima
2010 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing  
While digital watermarking technologies have been used in the past as a security feature for copyright protection, we aim to uncover possibilities for applying this "defensive" technology as an "offensive  ...  In this paper, a new medium of audio communication for humans and machines is discussed. We examine mobile services and the implementation of digital watermarks on music and audio files.  ...  The mark can be used as evidence for tracking, in the event that content is copied. Digital watermarking does not prevent unauthorized copies.  ... 
doi:10.1109/iihmsp.2010.31 dblp:conf/iih-msp/HirakawaI10 fatcat:c35rnxqeyfayne6chudeclbjl4
« Previous Showing results 1 — 15 out of 15,602 results