1,121 Hits in 5.4 sec

End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation

Andras Boho, Glenn Van Wallendael, Ann Dooms, Jan De Cock, Geert Braeckman, Peter Schelkens, Bart Preneel, Rik Van de Walle
2013 IEEE Signal Processing Magazine  
End-to-end security for video distribution: the combination of encryption, watermarking, and video adaptation. Signal Processing Magazine, IEEE 30(2) 97-107. Abstract Abstract.  ...  This paper introduces the reader to the relevant techniques that are needed to implement such an end-to-end commutative security system for video distribution, and presents a practical solution for encryption  ...  Some of our results were achieved within the context of the AQUA and OMUS projects of the Interdisciplinary Institute for Broadband Technology (IBBT) and the DaVinci project of IMPact.  ... 
doi:10.1109/msp.2012.2230220 fatcat:nkz5vzmq7nbetnrkwewwrkj3ai

Secure Multimedia Content Distribution for M2M Communication

Conghuan Ye, Zenggang Xiong, Yaoming Ding, Xuemin Zhang, Guangwei Wang, Fang Xu
2016 International Journal of Security and Its Applications  
In this paper, we focus on an aspect of DRM that involves secure multimedia distribution which combines multimedia encryption, copy detection, and digital fingerprinting to prevent widespread piracy.  ...  In this paper, we first use using encryption, fingerprinting and copy detection for secure distribution in M2M communication environments.  ...  been developed for images, audio, and video [14] .  ... 
doi:10.14257/ijsia.2016.10.4.26 fatcat:dsqd7cgmwrcapa2komozfgy4la

New channels for carrying copyright and usage rights data in digital multimedia distribution

A.M. Eskicioglu, E.J. Delp, M.R. Eskicioglu
2003 International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003.  
Cryptographic tools are commonly used for secure delivery of content and access keys to consumers via terrestrial, satellite, cable and Internet transmissions.  ...  A third requirement is the distribution of the copyright or usage rights associated with the digital content The integrity, as opposed to security, of this data is essential to prevent unauthorized modification  ...  In our work, we will investigate a unified approach, combining encryption with watermarking.  ... 
doi:10.1109/itre.2003.1270580 fatcat:iduku3omx5dulmpzldwbdk2xpu

A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks

Mohammed Abazeed, Kashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Norsheila Fisal, Jalal Al-Muhtadi, Suleiman Zubair
2015 International Journal of Distributed Sensor Networks  
A critical and comprehensive review of state-of-the-art routing and security approaches for WMSNs is presented, followed by the discussion of their limitations and features.  ...  This paper discusses the challenges of secure routing in WMSNs, where most of the proposed works in the literature deal with routing and security as individual issues.  ...  Acknowledgment The authors extend their appreciation to the Deanship of Scientific Research at King Saud University, Riyadh, Saudi Arabia, for funding this work through the international research group  ... 
doi:10.1155/2015/524038 fatcat:ayamuf4vxjh77hvrxvu5xn2gfq

A survey on security, privacy and anonymity in legal distribution of copyrighted multimedia content over peer-to-peer networks

Amna Qureshi, Helena Rifà-Pous, David Megías Jiménez
2013 IN3 Working Paper Series  
The P2P technology for content distribution systems is beneficial to both content providers and end users.  ...  Most of the research work involving fingerprinting protocols for copyright protection incurs high computational and communicational burdens due to the use of public-key encryption of the contents, secure  ...  She is also member of scientific committee of several journals and conferences.  ... 
doi:10.7238/in3wps.v0i0.1890 fatcat:3l54utaggjbxraw4jioekbgjom

A Secured Frame Selection Based Video Watermarking Technique to Address Quality Loss of Data: Combining Graph Based Transform, Singular Valued Decomposition, and Hyperchaotic Encryption

Chirag Sharma, Bagga Amandeep, Rajeev Sobti, Tarun Kumar Lohani, Mohammad Shabaz, Manjit Kaur
2021 Security and Communication Networks  
The watermark cannot be embedded in every frame of the video as it adds to the size of the video and watermark can be easily retrieved by an intruder.  ...  The advancement of Internet technologies has led to the availability of audios, images, and videos in different forms.  ...  Videos are the most attackable multimedia data and unauthorized people are distributing videos for their own benefits and are earning lots of money in this regard. e illegal distribution of video is illustrated  ... 
doi:10.1155/2021/5536170 fatcat:6e3zeni3tffmvd4bqidemmqbse

Digital Rights Management for Video Sensor Network

Taojun Wu, Liang Dai, Yuan Xue, Yi Cui
2006 Eighth IEEE International Symposium on Multimedia (ISM'06)  
Within this architecture, we propose a binary-tree-based hierarchical key generation scheme for data encryption, and adopt a label-guided watermarking strategy to address the unique challenges of video  ...  Video sensor network is evolving from an isolated system to an integral component of the global information infrastructure.  ...  Acknowledgement We thank Professor Klara Nahrstedt from the University of Illinois for insightful discussion on this paper.  ... 
doi:10.1109/ism.2006.62 dblp:conf/ism/WuDXC06 fatcat:xejgaws3areorjc2naddniaphm

A Survey of H.264 AVC/SVC Encryption

Thomas Stutz, Andreas Uhl
2012 IEEE transactions on circuits and systems for video technology (Print)  
The survey intends to give researchers and practitioners an analytic and critical overview of the state-ofthe-art of video encryption narrowed down to its joint application with the H.264 standard suite  ...  Video encryption has been heavily researched in the recent years.  ...  ., in a commercial content-distribution scenario the security notion for video cryptosystems is different to the conventional cryptographic security notion for cryptosystems.  ... 
doi:10.1109/tcsvt.2011.2162290 fatcat:bj6cpb2mwjg6tnpdyukgd6e2t4

Intellectual Property Protection for Distributed Neural Networks - Towards Confidentiality of Data, Model, and Inference

Laurent Gomez, Alberto Ibarrondo, José Márquez, Patrick Duverger
2018 Proceedings of the 15th International Joint Conference on e-Business and Telecommunications  
In this paper we propose to leverage Fully Homomorphic Encryption (FHE) to protect simultaneously the IP of trained NN based software, as well as the input data and inferences.  ...  domain as well as enable novel ones such as those on recognition, autonomous, predictive, resilient, selfmanaged, adaptive, and evolving applications.  ...  This new paradigm calls for solutions to protect IP of distributed DL inference processing systems, with DNN deployment and execution on decentralized systems.  ... 
doi:10.5220/0006854703130320 dblp:conf/icete/GomezIMD18 fatcat:nx27qgkhkfgg7lrm4ybxo65q2q

Intelligent Video Data Security: A Survey and Open Challenges

Jin-Yong Yu, Yujun Kim, Young-Gab Kim
2021 IEEE Access  
Among potential methods to protect video data, intelligent security is the most promising, and it can be defined as a combination of intelligent technologies, such as adaptive and awareness, with security  ...  Moreover, scrambled images are combined with Chen's chaotic system, DNA sequences, and the proposed adaptive method to increase the complexity of the encryption algorithm.  ... 
doi:10.1109/access.2021.3057605 fatcat:ysfjqskz2rgwtfgcjmjx4nqiky

An Integrated Secure Web Architecture For Protected Mobile Code Distribution [chapter]

Mehrdad Jalali-Sohi, Rigobert Foka, Gaël Hachez, Alexander Beitlich
2001 IFIP Advances in Information and Communication Technology  
software and the power of servers.  ...  IPR (Intellectual Property Rights) protection is one of the key elements to be considered in the development of mobile code technologies (applets, agents, etc.) due to the mobile nature of this kind of  ...  Object Watermarking This topic was one of the FIUGRANE research topics. Watermarks were first used in the image I video and audio domain.  ... 
doi:10.1007/978-0-387-35413-2_3 fatcat:hiuea2tx2jepvk5eorlgpksrzq

Recent Advances in Watermarking for Scalable Video Coding [chapter]

Dan Grois, Ofer Hadar
2012 Watermarking - Volume 2  
by using the Scalable Video Coding, and presented combined schemes of the SVC watermarking and encryption.  ...  (Schierl et al., 2007) . 3 The term "scalability" refers to the removal of parts of the video bit stream in order to adapt it to the various needs or preferences of end users as well as to varying terminal  ...  Recent Advances in Watermarking for Scalable Video Coding, Watermarking -Volume 2, Dr.  ... 
doi:10.5772/37543 fatcat:m5pm226fxne3ziveswph4ukqti

Video fingerprinting and encryption principles for digital rights management

2004 Proceedings of the IEEE  
This paper provides a tutorial and survey of digital fingerprinting and video scrambling algorithms based on partial encryption.  ...  We also propose a novel architecture for joint fingerprinting and decryption that holds promise for a better compromise between practicality and security for emerging digital rights management applications  ...  The server is responsible for secure video distribution, which is achieved through a combination of compression and security processing that includes fingerprinting.  ... 
doi:10.1109/jproc.2004.827356 fatcat:dnfcnuovtjfengnt3tdke5mctu

Cryptographic key distribution over a public network via variance-based watermarking in compressive measurements [article]

Wen-Kai Yu
2019 arXiv   pre-print
Here we present a protocol for cryptographic key distribution over a public network via photon-counting compressive imaging system with watermarking, which utilizes watermarking technique to distribute  ...  The realization of this protocol is a step forward toward the practical applications, and will be beneficial for the broader fields of optical security in many ways.  ...  Acknowledgements The author greatly appreciates Ning Wu for offering help in improving the manuscript. This work is supported by the National Natural Science Founda-  ... 
arXiv:1904.00049v1 fatcat:rofztjzk6jdw5nthjhjmqfn7he

Security of Surveillance Wireless Camera Sensor Network Systems using Embedding Techniques for Authentication

Quist-Aphetsi Kester, Mohammed Dolapo, Ozoemena Willis
2015 International Journal of Computer Applications  
This will ensure the safety and security of the digital video feeds as well as provide means of authenticating the video. These authentication approaches should be able to identify tamper detection.  ...  Security in today's wireless camera sensor networks is very crucial for authentication of video feeds from appropriate sources.  ...  Results showed that the proposed technique did not affect the higher and lower ends of the frequency distribution of the signal.  ... 
doi:10.5120/ijca2015904581 fatcat:x4amdeojefaf5fyvtbtwpcxvya
« Previous Showing results 1 — 15 out of 1,121 results