A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation
2013
IEEE Signal Processing Magazine
End-to-end security for video distribution: the combination of encryption, watermarking, and video adaptation. Signal Processing Magazine, IEEE 30(2) 97-107. Abstract Abstract. ...
This paper introduces the reader to the relevant techniques that are needed to implement such an end-to-end commutative security system for video distribution, and presents a practical solution for encryption ...
Some of our results were achieved within the context of the AQUA and OMUS projects of the Interdisciplinary Institute for Broadband Technology (IBBT) and the DaVinci project of IMPact. ...
doi:10.1109/msp.2012.2230220
fatcat:nkz5vzmq7nbetnrkwewwrkj3ai
Secure Multimedia Content Distribution for M2M Communication
2016
International Journal of Security and Its Applications
In this paper, we focus on an aspect of DRM that involves secure multimedia distribution which combines multimedia encryption, copy detection, and digital fingerprinting to prevent widespread piracy. ...
In this paper, we first use using encryption, fingerprinting and copy detection for secure distribution in M2M communication environments. ...
been developed for images, audio, and video [14] . ...
doi:10.14257/ijsia.2016.10.4.26
fatcat:dsqd7cgmwrcapa2komozfgy4la
New channels for carrying copyright and usage rights data in digital multimedia distribution
2003
International Conference on Information Technology: Research and Education, 2003. Proceedings. ITRE2003.
Cryptographic tools are commonly used for secure delivery of content and access keys to consumers via terrestrial, satellite, cable and Internet transmissions. ...
A third requirement is the distribution of the copyright or usage rights associated with the digital content The integrity, as opposed to security, of this data is essential to prevent unauthorized modification ...
In our work, we will investigate a unified approach, combining encryption with watermarking. ...
doi:10.1109/itre.2003.1270580
fatcat:iduku3omx5dulmpzldwbdk2xpu
A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks
2015
International Journal of Distributed Sensor Networks
A critical and comprehensive review of state-of-the-art routing and security approaches for WMSNs is presented, followed by the discussion of their limitations and features. ...
This paper discusses the challenges of secure routing in WMSNs, where most of the proposed works in the literature deal with routing and security as individual issues. ...
Acknowledgment The authors extend their appreciation to the Deanship of Scientific Research at King Saud University, Riyadh, Saudi Arabia, for funding this work through the international research group ...
doi:10.1155/2015/524038
fatcat:ayamuf4vxjh77hvrxvu5xn2gfq
A survey on security, privacy and anonymity in legal distribution of copyrighted multimedia content over peer-to-peer networks
2013
IN3 Working Paper Series
The P2P technology for content distribution systems is beneficial to both content providers and end users. ...
Most of the research work involving fingerprinting protocols for copyright protection incurs high computational and communicational burdens due to the use of public-key encryption of the contents, secure ...
She is also member of scientific committee of several journals and conferences. ...
doi:10.7238/in3wps.v0i0.1890
fatcat:3l54utaggjbxraw4jioekbgjom
A Secured Frame Selection Based Video Watermarking Technique to Address Quality Loss of Data: Combining Graph Based Transform, Singular Valued Decomposition, and Hyperchaotic Encryption
2021
Security and Communication Networks
The watermark cannot be embedded in every frame of the video as it adds to the size of the video and watermark can be easily retrieved by an intruder. ...
The advancement of Internet technologies has led to the availability of audios, images, and videos in different forms. ...
Videos are the most attackable multimedia data and unauthorized people are distributing videos for their own benefits and are earning lots of money in this regard. e illegal distribution of video is illustrated ...
doi:10.1155/2021/5536170
fatcat:6e3zeni3tffmvd4bqidemmqbse
Digital Rights Management for Video Sensor Network
2006
Eighth IEEE International Symposium on Multimedia (ISM'06)
Within this architecture, we propose a binary-tree-based hierarchical key generation scheme for data encryption, and adopt a label-guided watermarking strategy to address the unique challenges of video ...
Video sensor network is evolving from an isolated system to an integral component of the global information infrastructure. ...
Acknowledgement We thank Professor Klara Nahrstedt from the University of Illinois for insightful discussion on this paper. ...
doi:10.1109/ism.2006.62
dblp:conf/ism/WuDXC06
fatcat:xejgaws3areorjc2naddniaphm
A Survey of H.264 AVC/SVC Encryption
2012
IEEE transactions on circuits and systems for video technology (Print)
The survey intends to give researchers and practitioners an analytic and critical overview of the state-ofthe-art of video encryption narrowed down to its joint application with the H.264 standard suite ...
Video encryption has been heavily researched in the recent years. ...
., in a commercial content-distribution scenario the security notion for video cryptosystems is different to the conventional cryptographic security notion for cryptosystems. ...
doi:10.1109/tcsvt.2011.2162290
fatcat:bj6cpb2mwjg6tnpdyukgd6e2t4
Intellectual Property Protection for Distributed Neural Networks - Towards Confidentiality of Data, Model, and Inference
2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications
In this paper we propose to leverage Fully Homomorphic Encryption (FHE) to protect simultaneously the IP of trained NN based software, as well as the input data and inferences. ...
domain as well as enable novel ones such as those on recognition, autonomous, predictive, resilient, selfmanaged, adaptive, and evolving applications. ...
This new paradigm calls for solutions to protect IP of distributed DL inference processing systems, with DNN deployment and execution on decentralized systems. ...
doi:10.5220/0006854703130320
dblp:conf/icete/GomezIMD18
fatcat:nx27qgkhkfgg7lrm4ybxo65q2q
Intelligent Video Data Security: A Survey and Open Challenges
2021
IEEE Access
Among potential methods to protect video data, intelligent security is the most promising, and it can be defined as a combination of intelligent technologies, such as adaptive and awareness, with security ...
Moreover, scrambled images are combined with Chen's chaotic system, DNA sequences, and the proposed adaptive method to increase the complexity of the encryption algorithm. ...
doi:10.1109/access.2021.3057605
fatcat:ysfjqskz2rgwtfgcjmjx4nqiky
An Integrated Secure Web Architecture For Protected Mobile Code Distribution
[chapter]
2001
IFIP Advances in Information and Communication Technology
software and the power of servers. ...
IPR (Intellectual Property Rights) protection is one of the key elements to be considered in the development of mobile code technologies (applets, agents, etc.) due to the mobile nature of this kind of ...
Object Watermarking This topic was one of the FIUGRANE research topics. Watermarks were first used in the image I video and audio domain. ...
doi:10.1007/978-0-387-35413-2_3
fatcat:hiuea2tx2jepvk5eorlgpksrzq
Recent Advances in Watermarking for Scalable Video Coding
[chapter]
2012
Watermarking - Volume 2
by using the Scalable Video Coding, and presented combined schemes of the SVC watermarking and encryption. ...
(Schierl et al., 2007) .
3 The term "scalability" refers to the removal of parts of the video bit stream in order to adapt it to the various needs or preferences of end users as well as to varying terminal ...
Recent Advances in Watermarking for Scalable Video Coding, Watermarking -Volume 2, Dr. ...
doi:10.5772/37543
fatcat:m5pm226fxne3ziveswph4ukqti
Video fingerprinting and encryption principles for digital rights management
2004
Proceedings of the IEEE
This paper provides a tutorial and survey of digital fingerprinting and video scrambling algorithms based on partial encryption. ...
We also propose a novel architecture for joint fingerprinting and decryption that holds promise for a better compromise between practicality and security for emerging digital rights management applications ...
The server is responsible for secure video distribution, which is achieved through a combination of compression and security processing that includes fingerprinting. ...
doi:10.1109/jproc.2004.827356
fatcat:dnfcnuovtjfengnt3tdke5mctu
Cryptographic key distribution over a public network via variance-based watermarking in compressive measurements
[article]
2019
arXiv
pre-print
Here we present a protocol for cryptographic key distribution over a public network via photon-counting compressive imaging system with watermarking, which utilizes watermarking technique to distribute ...
The realization of this protocol is a step forward toward the practical applications, and will be beneficial for the broader fields of optical security in many ways. ...
Acknowledgements The author greatly appreciates Ning Wu for offering help in improving the manuscript. This work is supported by the National Natural Science Founda- ...
arXiv:1904.00049v1
fatcat:rofztjzk6jdw5nthjhjmqfn7he
Security of Surveillance Wireless Camera Sensor Network Systems using Embedding Techniques for Authentication
2015
International Journal of Computer Applications
This will ensure the safety and security of the digital video feeds as well as provide means of authenticating the video. These authentication approaches should be able to identify tamper detection. ...
Security in today's wireless camera sensor networks is very crucial for authentication of video feeds from appropriate sources. ...
Results showed that the proposed technique did not affect the higher and lower ends of the frequency distribution of the signal. ...
doi:10.5120/ijca2015904581
fatcat:x4amdeojefaf5fyvtbtwpcxvya
« Previous
Showing results 1 — 15 out of 1,121 results