A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
for DDoS Attacks using NS-2 A New Collusion Attack Using Interpolation for Multimedia Fingerprinting
2016
International Journal of Security and Its Applications
With different fingerprinted copies, collusion attack can produce a new colluded fingerprinted copy for get rid of the fingerprint information from the colluded copy, so digital fingerprinting technique ...
The proposed interpolation collusion attack scheme comes from the idea of image fusion. ...
to methods of constructing a new image from a corresponding original image sequence. ...
doi:10.14257/ijsia.2016.10.5.14
fatcat:4c3e734wvbaphfftgfbp3cvogi
A Multi-purpose Dual Watermarking Scheme
2013
International Journal of Computer Applications
For fingerprinting images, an ID number or a unique code pertaining to the buyer is hidden with in the digital resources at the time of resource transfer. ...
For copyright protection of the resource, a unique signature such as a logo of the owner creator is integrated imperceptibly. ...
CONCLUSION A novel watermarking scheme for dual purpose of copyright protection and fingerprinting digital images is proposed. ...
doi:10.5120/13411-1066
fatcat:qpd7owj2cff73opxgd6vqr7psy
LSB HIDING USING RANDOM APPROACH FOR IMAGE WATERMARKING
2014
International Journal of Research in Engineering and Technology
protection for intellectual property from illegal copying. ...
A digital image watermarking is the process of embedding an image with a secondary parameter called watermark, without deterioration in the quality of image to provide copyright protection means to provide ...
Thus the, content owners see a high risk of piracy and concern about the protection of their intellectual property from illegal copying. Copyright protection of such data is an important issue. ...
doi:10.15623/ijret.2014.0302110
fatcat:k3dgtabr75asphgcjx3g5jkoyu
Secure Multimedia Content Distribution for M2M Communication
2016
International Journal of Security and Its Applications
Multimedia encryption is used to encrypt multimedia content firstly before distribution, then, Copy detection is used to verify whether a protected multimedia content is a redistributed copy of its or ...
no, At last, digital fingerprinting is introduced to protect multimedia content further. ...
Concerned about the consequences of piracy of multimedia data, owners are interested in encryption, digital watermarking, and multimedia authentication which can protect their content from illegal use ...
doi:10.14257/ijsia.2016.10.4.26
fatcat:dsqd7cgmwrcapa2komozfgy4la
Watermarking Schemes For Copy Protection : A Survey
2012
International Journal of Computer Science & Engineering Survey
DIGITAL WATERMARKING ...
Digital watermarking is a technique that proffers a means to guard digital images from illegal copying and manipulation. ...
This system broadly tries to prevent illicit copies from being made from either the analog or digital I/O channels of DVD recorders. ...
doi:10.5121/ijcses.2012.3106
fatcat:o7wrj4glunaefckwi25zqrx7zy
Some general methods for tampering with watermarks
1998
IEEE Journal on Selected Areas in Communications
Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. ...
In such a scenario, it is important that the watermark survive both normal signal transformations and attempts to remove the watermark so that an illegal copy can be made. ...
Kilian for many useful discussions and comments. ...
doi:10.1109/49.668980
fatcat:xvcpnq3azbg2dbg7uyfjol4ztq
The "ticket" concept for copy control based on embedded signalling
[chapter]
1998
Lecture Notes in Computer Science
The concept is part of a proposal currently under investigation for standardization of DVD / CPTWG copy control. ...
Although the ticket shows similarities with a digital signature, there are essential differences. ...
The first aim of copy protection schemes is to prevent illegal copies from being made. ...
doi:10.1007/bfb0055868
fatcat:r4ghmpmh6rc4za6zezieytt65q
A Study on Implementation and Service of Digital Watermark Technology Architecture for Distribution Management
[chapter]
2011
Designing and Deploying RFID Applications
However, I believe that a societal system for preventing such problems is lacking, and a fundamental reason for this may be a gap in perspective at the business management level with respect to the low-cost ...
As can be seen from these examples, consumers' trust, especially in regard to food safety, is at risk of being damaged. ...
By embedding copy control information into digital watermarks, which are robust against digital disturbances, it is possible to construct a copyright protection system that can prevent illegal copying. ...
doi:10.5772/17514
fatcat:l5e5z6u2x5fnhd5qleygfsdz4q
Recursive Chaotic Desynchronized Fingerprint for Large Scale Distribution Using Social Network Analysis
2016
International Journal of Multimedia and Ubiquitous Engineering
Average collusion attack is a very effective attack for digital fingerprinting system. Moreover, the commercial value of the colluded content is often time-sensitive. ...
The more profit the colluder will make from it when the colluded copy is distributed earlier. ...
Digital fingerprinting can be used to identify devices which use multimedia copy for illegal purposes. ...
doi:10.14257/ijmue.2016.11.7.31
fatcat:36rpn4zxdnbuxghiklj6qmj3hq
Digital Image Watermarking: A Study on Techniques & Issues
2015
International Journal of Scientific and Engineering Research
Watermarking is an effective method for restricting abuses of published digital contents and to protect ownership rights of the owner. ...
Digital data can be easily copied and modified to create duplicate copies. These modified images are then redistributed through the Internet. ...
The use IJSER ISSN 2229-5518 IJSER © 2015 http://www.ijser.org of Watermarking does not ensure that our digital data is protected from being copied and edited. ...
doi:10.14299/ijser.2015.12.010
fatcat:ad7e6rx7gjfwnp6hs5w5ybpnv4
A Secure Fingerprinted Multimedia Distribution Using Social Network Analysis
2016
International Journal of Security and Its Applications
Collusion attack is a very effective attack for digital fingerprinting system. ...
Digital watermarking can be used to protect ownership, copyright authentication, and digital fingerprinting [17] . ...
There are other measures such as image encryption, image hash, copy detection, and information hiding to protect multimedia content from illegal use. ...
doi:10.14257/ijsia.2016.10.4.20
fatcat:7mq7qn3tqvdltnousokjvhbscm
Speeding up the Detection of Line Drawings Using a Hash Table
2009
2009 Chinese Conference on Pattern Recognition
Therefore, in the case of line drawings, copyright protection method should also be available for handwritten copies. ...
Although a method applicable to handwritten copy detection has been proposed, its processing is time-consuming since it is based on matching a large number of local features extracted from images. ...
ACKNOWLEDGEMENTS This work was supported in part by the Grant-in-Aid for Scientific Research (B)(19300062) from Japan Society for the Promotion of Science(JSPS). ...
doi:10.1109/ccpr.2009.5343969
fatcat:ax6a2wvdjzcnpp5gbb6stw5doy
Use of both Invisible and Emergable Watermarks to Deter Illegal Copying of Images
2013
Procedia Computer Science
A method has thus been developed in which frequency filtering is used to divide the content into two types of region, one for embedding an emergable watermark and one for embedding invisible one. ...
Emergable watermarks become visible in content that has been copied under designated conditions so that their use should deter illegal copying. ...
Introduction Digital watermarking, which helps protect digital content against illegal reproduction and distribution by embedding information into it, is one countermeasure against illegal copying. ...
doi:10.1016/j.procs.2013.09.118
fatcat:cs36srjygjhr5inmyqdinmjpri
Safeguarding the Digital Contents: Digital Watermarking
English
2009
DESIDOC Journal of Library & Information Technology
English
It has been concluded that the protection of individual rights is a must, and deeper understanding of the DWM will lead to the design of more reliable systems for safe-guarding digital contents. ...
Digital watermarks are one of the tools which helps to make the distribution of digital material more secure. It is a kind of digital signal or pattern hidden directly in digital content. ...
Because of the massive illegal copying of media files, content owners utilise various protection technologies like digital rights management (DRM) and/or digital watermarking. ...
doi:10.14429/djlit.29.249
fatcat:wo24xv5t4rczdcbiphwgiqtvfy
Mobile Services and Implementation of Digital Watermarks in Audio Files
2010
2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
While digital watermarking technologies have been used in the past as a security feature for copyright protection, we aim to uncover possibilities for applying this "defensive" technology as an "offensive ...
In this paper, a new medium of audio communication for humans and machines is discussed. We examine mobile services and the implementation of digital watermarks on music and audio files. ...
The mark can be used as evidence for tracking, in the event that content is copied. Digital watermarking does not prevent unauthorized copies. ...
doi:10.1109/iihmsp.2010.31
dblp:conf/iih-msp/HirakawaI10
fatcat:c35rnxqeyfayne6chudeclbjl4
« Previous
Showing results 1 — 15 out of 15,602 results