A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Audio watermarking and partial encryption
2005
Security, Steganography, and Watermarking of Multimedia Contents VII
A watermark is embedded in and detected from an encrypted or unencrypted file. The watermark also does not influence the encryption mechanism. ...
Existing methods combine these methods in first embedding the watermark and than encrypting the content. ...
ACKNOWLEDGEMENT The work described in this paper has been supported in part by the European Commission through the IST Programme under Contract IST-2002-507932 ECRYPT. ...
doi:10.1117/12.586875
dblp:conf/sswmc/SteinebachZB05
fatcat:o2axhmmg6fg5lcb7fmxffxp3za
Medical Image Privacy Using Watermarking Techniques
2019
International Journal of Scientific Research in Computer Science Engineering and Information Technology
There are several methods to encrypt binary or grey level images. Watermarking can be an answer to make secure image transmission. ...
Therefore, the digital image watermarking based on DWT co-efficient. Watermark bits are embedded in uploaded images. Watermarked images are shared in user home page. ...
In closely related fields, partial encryption has been employed in secure client-side watermarking and as a means for implementing commutative watermarking and encryption. ...
doi:10.32628/cseit195533
fatcat:bdwt5ub55jeihi5daqmn6wkdpi
Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD
2003
Multimedia Systems
A combined selective watermarking and encryption method that operates in the compressed MPEG domain is introduced. Watermarking resistant to a number of attacks is used for copyright protection. ...
The video can only be viewed using the developed Secure MPEG Player, which performs real-time decryption of the encrypted video. ...
Encryption In order to prevent unauthorized viewing of the watermarked video stream, partial encryption is employed. ...
doi:10.1007/s00530-003-0093-4
fatcat:mhnhg7tvb5c4pkrp3poa3v7lhu
Reversible Data Hiding on Image Encryption with Index Boundary for Partial Confidential Documents
2020
International journal of recent technology and engineering
There are various protection techniques of confidential data like digital watermarking, digital signals with embedding data into images, audio and videos. ...
The proposed method of reversible data hiding has an efficient encryption in medical images, health care image and data transmitting in various organizations. ...
The data may be a whole confidential or partial confidential document to exchange through the network. ...
doi:10.35940/ijrte.f7142.038620
fatcat:zx23siqs2ne5fcgq3pd4wzcqsq
Image Encryption and Compression for Medical Image Security
2008
2008 First Workshops on Image Processing Theory, Tools and Applications
The main keywords are compression, encryption, watermarking and data hiding. ...
The second group bases the protection on digital watermarking or data hiding, aimed at secretly embedding a message into the data. ...
The first one is based on content protection through encryption [5] , [6] . In this group, proper decryption of data requires a key. ...
doi:10.1109/ipta.2008.4743800
fatcat:7gpbjpbr55fcpoikijd4t6ah7a
Video fingerprinting and encryption principles for digital rights management
2004
Proceedings of the IEEE
This paper provides a tutorial and survey of digital fingerprinting and video scrambling algorithms based on partial encryption. ...
We also propose a novel architecture for joint fingerprinting and decryption that holds promise for a better compromise between practicality and security for emerging digital rights management applications ...
The marks, also called the fingerprint payload, are usually embedded through the process of robust digital watermarking. ...
doi:10.1109/jproc.2004.827356
fatcat:dnfcnuovtjfengnt3tdke5mctu
Integrated Partial Encryption and Watermarking Technique for Digital Video using Chaos and Support Images
2020
International Journal of Engineering and Advanced Technology
A sequence of color frames is watermarked in two phases, and partially encrypted in two layers, the watermarks considered are encrypted before embedding. ...
For entertainment type videos, partial encryption and watermarking may be integrated such that both objectives are attained. ...
Thus we have a sequence of 16 color frames which are partially encrypted, and watermarked. ...
doi:10.35940/ijeat.d6485.049420
fatcat:objhhspqabawfmlenswgtdd6vy
Optimized Hybrid Security Mechanism for Image Authentication and Secrecy using PSO
2013
International journal of network security and its applications
The digital watermarking scheme provides copyright protection, the hash function provides an authentication, and an encryption scheme provides security against illegal duplication and manipulation of multimedia ...
In this paper an optimized hybrid image security scheme for copyright protection, authentication and security of digital images using Particle Swarm Optimization(PSO) in daubechies4 wavelet transform is ...
(b) Watermark logo, Fig.1.(c)Watermarked Hash attached Partially Encrypted Lena image.Fig 1.(d) Permutation With Watermarked Hash Attached Partially Encrypted Image , Fig 1. ...
doi:10.5121/ijnsa.2013.5510
fatcat:w3ktt2egcnbs7etlvdsfl6lafu
Compressed-encrypted domain JPEG2000 image watermarking
2010
2010 IEEE International Conference on Multimedia and Expo
In this paper, we propose a robust watermark embedding technique for JPEG2000 compressed and encrypted images. ...
The distributors in the chain face the problem of embedding their watermark in compressed, encrypted domain for copyright violation detection purpose. ...
of watermark signal bits embedded per encrypted message. ...
doi:10.1109/icme.2010.5583571
dblp:conf/icmcs/SubramanyamEK10
fatcat:gidhvtihrjghdlwc34zbueiro4
Image Water-Marking/De-Watermarking using Spatial Domain Technique
2019
International Journal of Engineering and Advanced Technology
There are various existing techniques for cryptography and watermarking. The multimedia data security can be achieved by means of encryption and decryption i.e. cryptography. ...
The encrypted data combined with cover image is treated as embedded image. The embedded image then compressed using wavelet transforms compression. ...
For greater security of data, combination of encryption and watermarking is used before embedding phase. ...
doi:10.35940/ijeat.b3568.129219
fatcat:ic3vx7ugxrecrjjouaf6obpbti
An Electronic Bill Encryption Algorithm Based on Multiple Watermark Encryption
2021
Traitement du signal
Digital image watermarking can authenticate and protect images through image processing and cryptography. ...
The proposed method enhances the anti-attack ability of watermarks by constructing the wavelet coefficient matrix and binary sequence for chaotic encryption, and effectively improves the security of electronic ...
The TM-based image area detection can be defined as follows: Through the above analysis, this paper proposes a multiple watermark encryption method using both visible and invisible watermarks, with the ...
doi:10.18280/ts.380113
fatcat:g2miinggtnffnkw5qzdrilbspy
Efficient Security Based Video Watermarking Technique using Chaotic Encryption with Discrete Cosine Transform
2019
International Journal of Engineering and Advanced Technology
Arnold transform is applied for chaotic encryption to offer extra security to the watermark. A set of three versions of the proposed model has been applied and the results are investigated. ...
In this paper, a novel chaotic encryption-based blind digital video watermarking technique (DVWT) is presented for grayscale and color images. ...
The modulation is done with difference 'D' in order to data bit that are to be embedded. To enhance the security prior to watermark embedding 'w', two-level watermark encryption is done. ...
doi:10.35940/ijeat.f8113.088619
fatcat:if4n64tmrbgp7gopmqd3vqziie
End-To-End Security for Video Distribution: The Combination of Encryption, Watermarking, and Video Adaptation
2013
IEEE Signal Processing Magazine
Watermarking can complement encryption in these scenarios by embedding a message within the content itself containing for example ownership information, unique buyer codes or content descriptions. ...
End-to-end security for video distribution: the combination of encryption, watermarking, and video adaptation. Signal Processing Magazine, IEEE 30(2) 97-107. Abstract Abstract. ...
We presented the use of partial encryption techniques in a trade-off between security and preserved functionality. ...
doi:10.1109/msp.2012.2230220
fatcat:nkz5vzmq7nbetnrkwewwrkj3ai
Watermarking of JPEG2000 Compressed Images with Improved Encryption
2013
International Journal of Computer Applications Technology and Research
The proposal also preserves the confidentiality of substance as the embedding is done on encrypted data. ...
The projected approach is used to execute a robust watermarking algorithm to watermark JPEG2000 compressed and encrypted images. For encryption it uses RC6 block cipher. ...
For encryption it uses RC4 stream cipher. The technique embed watermark in the compressedencrypted domain and extraction is through the decrypted domain. ...
doi:10.7753/ijcatr0203.1007
fatcat:dkddrre2jfegzepfaiiyz5w7yi
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENSING AND ENTROPY CODING
2018
The International Journal of Multimedia & Its Applications
Part number one will act as the host for two QIM watermarks then goes through encoding phase using Run-Length Encoding (RLE) followed by Huffman Encoding, while part number two goes through sparse watermark ...
embedding followed by a third QIM watermark embedding and compression phase using CS, then Huffman encoder is used to encode this part. ...
, compression, secure CS encryption). ...
doi:10.5121/ijma.2018.10617
fatcat:4ewkifr4jjdafdktmeerljrola
« Previous
Showing results 1 — 15 out of 1,491 results