Filters








1,491 Hits in 3.9 sec

Audio watermarking and partial encryption

Martin Steinebach, Sascha Zmudzinski, Torsten Bolke, Edward J. Delp III, Ping W. Wong
2005 Security, Steganography, and Watermarking of Multimedia Contents VII  
A watermark is embedded in and detected from an encrypted or unencrypted file. The watermark also does not influence the encryption mechanism.  ...  Existing methods combine these methods in first embedding the watermark and than encrypting the content.  ...  ACKNOWLEDGEMENT The work described in this paper has been supported in part by the European Commission through the IST Programme under Contract IST-2002-507932 ECRYPT.  ... 
doi:10.1117/12.586875 dblp:conf/sswmc/SteinebachZB05 fatcat:o2axhmmg6fg5lcb7fmxffxp3za

Medical Image Privacy Using Watermarking Techniques

B. Ananthapraba, K. Thyagarajan
2019 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
There are several methods to encrypt binary or grey level images. Watermarking can be an answer to make secure image transmission.  ...  Therefore, the digital image watermarking based on DWT co-efficient. Watermark bits are embedded in uploaded images. Watermarked images are shared in user home page.  ...  In closely related fields, partial encryption has been employed in secure client-side watermarking and as a means for implementing commutative watermarking and encryption.  ... 
doi:10.32628/cseit195533 fatcat:bdwt5ub55jeihi5daqmn6wkdpi

Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD

Dimitrios Simitopoulos, Nikolaos Zissis, Panagiotis Georgiadis, Vasileios Emmanouilidis, Michael G. Strintzis
2003 Multimedia Systems  
A combined selective watermarking and encryption method that operates in the compressed MPEG domain is introduced. Watermarking resistant to a number of attacks is used for copyright protection.  ...  The video can only be viewed using the developed Secure MPEG Player, which performs real-time decryption of the encrypted video.  ...  Encryption In order to prevent unauthorized viewing of the watermarked video stream, partial encryption is employed.  ... 
doi:10.1007/s00530-003-0093-4 fatcat:mhnhg7tvb5c4pkrp3poa3v7lhu

Reversible Data Hiding on Image Encryption with Index Boundary for Partial Confidential Documents

2020 International journal of recent technology and engineering  
There are various protection techniques of confidential data like digital watermarking, digital signals with embedding data into images, audio and videos.  ...  The proposed method of reversible data hiding has an efficient encryption in medical images, health care image and data transmitting in various organizations.  ...  The data may be a whole confidential or partial confidential document to exchange through the network.  ... 
doi:10.35940/ijrte.f7142.038620 fatcat:zx23siqs2ne5fcgq3pd4wzcqsq

Image Encryption and Compression for Medical Image Security

W. Puech
2008 2008 First Workshops on Image Processing Theory, Tools and Applications  
The main keywords are compression, encryption, watermarking and data hiding.  ...  The second group bases the protection on digital watermarking or data hiding, aimed at secretly embedding a message into the data.  ...  The first one is based on content protection through encryption [5] , [6] . In this group, proper decryption of data requires a key.  ... 
doi:10.1109/ipta.2008.4743800 fatcat:7gpbjpbr55fcpoikijd4t6ah7a

Video fingerprinting and encryption principles for digital rights management

D. KUNDUR, K. KARTHIK
2004 Proceedings of the IEEE  
This paper provides a tutorial and survey of digital fingerprinting and video scrambling algorithms based on partial encryption.  ...  We also propose a novel architecture for joint fingerprinting and decryption that holds promise for a better compromise between practicality and security for emerging digital rights management applications  ...  The marks, also called the fingerprint payload, are usually embedded through the process of robust digital watermarking.  ... 
doi:10.1109/jproc.2004.827356 fatcat:dnfcnuovtjfengnt3tdke5mctu

Integrated Partial Encryption and Watermarking Technique for Digital Video using Chaos and Support Images

2020 International Journal of Engineering and Advanced Technology  
A sequence of color frames is watermarked in two phases, and partially encrypted in two layers, the watermarks considered are encrypted before embedding.  ...  For entertainment type videos, partial encryption and watermarking may be integrated such that both objectives are attained.  ...  Thus we have a sequence of 16 color frames which are partially encrypted, and watermarked.  ... 
doi:10.35940/ijeat.d6485.049420 fatcat:objhhspqabawfmlenswgtdd6vy

Optimized Hybrid Security Mechanism for Image Authentication and Secrecy using PSO

K. Kuppusamy, K. Thamodaran
2013 International journal of network security and its applications  
The digital watermarking scheme provides copyright protection, the hash function provides an authentication, and an encryption scheme provides security against illegal duplication and manipulation of multimedia  ...  In this paper an optimized hybrid image security scheme for copyright protection, authentication and security of digital images using Particle Swarm Optimization(PSO) in daubechies4 wavelet transform is  ...  (b) Watermark logo, Fig.1.(c)Watermarked Hash attached Partially Encrypted Lena image.Fig 1.(d) Permutation With Watermarked Hash Attached Partially Encrypted Image , Fig 1.  ... 
doi:10.5121/ijnsa.2013.5510 fatcat:w3ktt2egcnbs7etlvdsfl6lafu

Compressed-encrypted domain JPEG2000 image watermarking

A. V. Subramanyam, Sabu Emmanuel, Mohan S. Kankanhalli
2010 2010 IEEE International Conference on Multimedia and Expo  
In this paper, we propose a robust watermark embedding technique for JPEG2000 compressed and encrypted images.  ...  The distributors in the chain face the problem of embedding their watermark in compressed, encrypted domain for copyright violation detection purpose.  ...  of watermark signal bits embedded per encrypted message.  ... 
doi:10.1109/icme.2010.5583571 dblp:conf/icmcs/SubramanyamEK10 fatcat:gidhvtihrjghdlwc34zbueiro4

Image Water-Marking/De-Watermarking using Spatial Domain Technique

2019 International Journal of Engineering and Advanced Technology  
There are various existing techniques for cryptography and watermarking. The multimedia data security can be achieved by means of encryption and decryption i.e. cryptography.  ...  The encrypted data combined with cover image is treated as embedded image. The embedded image then compressed using wavelet transforms compression.  ...  For greater security of data, combination of encryption and watermarking is used before embedding phase.  ... 
doi:10.35940/ijeat.b3568.129219 fatcat:ic3vx7ugxrecrjjouaf6obpbti

An Electronic Bill Encryption Algorithm Based on Multiple Watermark Encryption

Chuan Lin, Xinpeng Xu
2021 Traitement du signal  
Digital image watermarking can authenticate and protect images through image processing and cryptography.  ...  The proposed method enhances the anti-attack ability of watermarks by constructing the wavelet coefficient matrix and binary sequence for chaotic encryption, and effectively improves the security of electronic  ...  The TM-based image area detection can be defined as follows: Through the above analysis, this paper proposes a multiple watermark encryption method using both visible and invisible watermarks, with the  ... 
doi:10.18280/ts.380113 fatcat:g2miinggtnffnkw5qzdrilbspy

Efficient Security Based Video Watermarking Technique using Chaotic Encryption with Discrete Cosine Transform

2019 International Journal of Engineering and Advanced Technology  
Arnold transform is applied for chaotic encryption to offer extra security to the watermark. A set of three versions of the proposed model has been applied and the results are investigated.  ...  In this paper, a novel chaotic encryption-based blind digital video watermarking technique (DVWT) is presented for grayscale and color images.  ...  The modulation is done with difference 'D' in order to data bit that are to be embedded. To enhance the security prior to watermark embedding 'w', two-level watermark encryption is done.  ... 
doi:10.35940/ijeat.f8113.088619 fatcat:if4n64tmrbgp7gopmqd3vqziie

End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation

Andras Boho, Glenn Van Wallendael, Ann Dooms, Jan De Cock, Geert Braeckman, Peter Schelkens, Bart Preneel, Rik Van de Walle
2013 IEEE Signal Processing Magazine  
Watermarking can complement encryption in these scenarios by embedding a message within the content itself containing for example ownership information, unique buyer codes or content descriptions.  ...  End-to-end security for video distribution: the combination of encryption, watermarking, and video adaptation. Signal Processing Magazine, IEEE 30(2) 97-107. Abstract Abstract.  ...  We presented the use of partial encryption techniques in a trade-off between security and preserved functionality.  ... 
doi:10.1109/msp.2012.2230220 fatcat:nkz5vzmq7nbetnrkwewwrkj3ai

Watermarking of JPEG2000 Compressed Images with Improved Encryption

Kukoo Anna Mathew
2013 International Journal of Computer Applications Technology and Research  
The proposal also preserves the confidentiality of substance as the embedding is done on encrypted data.  ...  The projected approach is used to execute a robust watermarking algorithm to watermark JPEG2000 compressed and encrypted images. For encryption it uses RC6 block cipher.  ...  For encryption it uses RC4 stream cipher. The technique embed watermark in the compressedencrypted domain and extraction is through the decrypted domain.  ... 
doi:10.7753/ijcatr0203.1007 fatcat:dkddrre2jfegzepfaiiyz5w7yi

JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENSING AND ENTROPY CODING

Mohab Mostafa, Mohamed Waleed Fakhr
2018 The International Journal of Multimedia & Its Applications  
Part number one will act as the host for two QIM watermarks then goes through encoding phase using Run-Length Encoding (RLE) followed by Huffman Encoding, while part number two goes through sparse watermark  ...  embedding followed by a third QIM watermark embedding and compression phase using CS, then Huffman encoder is used to encode this part.  ...  , compression, secure CS encryption).  ... 
doi:10.5121/ijma.2018.10617 fatcat:4ewkifr4jjdafdktmeerljrola
« Previous Showing results 1 — 15 out of 1,491 results