Multimedia Content Protection by Biometrics-Based Scalable Encryption and Watermarking
Abstract
Keywords
Full Text:
PDFReferences
Sun, X., Wu, F., Li, S., Gao, W., Zhang, Y.-Q.: Seamless switching of scalable video bitstreams for efficient streaming. IEEE Transactions on Multimedia 6 (2004) 291–303
Almeida, J.M., Eager, D.L., Vernon, M.K., Wright, S.J.: Minimizing delivery cost in scalable streaming content distribution systems. IEEE Transactions on Multimedia 6 (2004) 356–365.
Wiegand, T., Sullivan, G.J., Bjntegaard, G., Luthra, A.: Overview of the H.264/AVC video coding standard. IEEE Transactions on Circuits and Systems for Video Technology 13 (2003) 560–576.
Parviainen, R., Parnes, P.: Large scale distributed watermarking of multicast media through encryption. Proceedings of the International Federation for Information Processing, Communications and Multimedia Security Joint Working Conference IFIP TC6 and TC11 (2001) 149–158.
Lim, Y., Xu, C., Feng, D.D.: Web-based image authentication using invisible fragile watermark. Conferences in Research and Practice in Information Technology (2002) 31–34.
Lan Juan; Huang Tie-Jun; Qu Jun-Hua; “A Perception-based Scalable Encryption Model for AVS Audio”, IEEE International Conference on Multimedia and Expo, Pp. 1778 – 1781, 2007.
Shahid, Z.; Chaumont, M.; Puech, W.; “Selective and scalable encryption of enhancement layers for dyadic scalable H.264/AVC by scrambling of scan patterns”, 16th IEEE International Conference on Image Processing (ICIP), Pp. 1273 – 1276, 2009.
Mingyu Li; Xiaowei Yi; Hengtai Ma; “A scalable encryption scheme for CCSDS image data compression standard”, IEEE International Conference on Information Theory and Information Security (ICITIS), Pp. 646 – 649, 2010.
Zhe-Ming Lu; Dian-Guo Xu; Sheng-He Sun; “Multipurpose image watermarking algorithm based on multistage vector quantization”, IEEE Transactions on Image Processing, Vol. 14, No. 4, Pp. 822 – 831, 2005.
F. Bao, Q. Sun, J. Hu, R. H. Deng, J. Wu, “Copyright protection through watermarking: towards tracing illegal Users”, The 6th IEEE International Workshop on Intelligent Signal Processing and Communication Systems (ISPACS’98), 4-6 November 1998, Melbourne, Australia, 1998.
I.J.Cox, J.P.M.G.Linnartz, “Some general methods for tampering with watermarks”, in IEEE international Conference on Image Processing”, 1997.
S.Craver, N. Memon, B. Yeo, M. Yeung, “Can invisible watermarks resolve rightful ownership”, IBM Research Report, RC 20509, July 25, 1996.
J. Zhao and E. Koch, “Embedding robust label into images for copyright protection”, Proceedings of the International Conference on Intellectual Property Rights for Specialized Information, Knowledge and New Technologies, Austria, Aug. 21-25, 1995.
F. Bao, R. Deng, Y. Han, A. Jeng, D. Narasimhalu, T. Nagir, “Breaking public key cryptosystems on tamper resistant devices in the presence of transient faults”, The Second Workshop on Secure Protocols, Paris, April, 1997, LNCS, Springer-Verlag, 1997.
L. Tang, “Methods for Encrypting and decrypting MPEG video data efficiently”, Proc. of the 4th ACM Multimedia Conference, Boston, MA, November, 1996.
U. Uludag and A. Jain. Multimedia content protection via biometricsbased encryption. In Proc. IEEE International Conference on Multimedia and Expo (ICME2003), Baltimore, MD, 3:237–240, 2003.
U. Uludag, S. Pankanti, S. Prabhakar, and A. Jain. Biometric cryptosystems: Issues and challenges. IEEE Special Issue on Enabling Security Technologies for Digital Rights Management, 92(6):948–960, 2004.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.