Skip to content

Advertisement

Multimedia Security and Rights Management

  1. Content type: Research Article

    To ensure secure content delivery, the Motion Picture Experts Group (MPEG) has dedicated significant effort to the digital rights management (DRM) issues. MPEG is now moving from defining only hooks to proprie...

    Authors: Ming Ji, SM Shen, Wenjun Zeng, Taka Senoh, Takafumi Ueno, Terumasa Aoki, Yasuda Hiroshi and Takuyo Kogure

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:303278

    Published on:

  2. Content type: Research Article

    Many systems have been proposed for protecting the intellectual property of multimedia authors and owners from the public at large, who have access to the multimedia only after it is published. In this paper, ...

    Authors: Nicholas Paul Sheppard, Reihaneh Safavi-Naini and Philip Ogunbona

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:657830

    Published on:

  3. Content type: Research Article

    Digital image content authentication addresses the problem of detecting any illegitimate modification on the content of images. To cope with this problem, a novel semifragile watermarking scheme using the pinned ...

    Authors: Anthony T.S. Ho, Xunzhan Zhu and Yong Liang Guan

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:185761

    Published on:

  4. Content type: Research Article

    In recent years a number of wavelet-based watermarking schemes have been proposed and exhibited improved qualities. The choice of a wavelet filter bank for a digital watermarking scheme can have a significant ...

    Authors: Martin Dietze and Sabah Jassim

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:130901

    Published on:

  5. Content type: Research Article

    Watermarking for video sequences should consider additional attacks, such as frame averaging, frame-rate change, frame shuffling or collusion attacks, as well as those of still images. Also, since video is a s...

    Authors: Han-Seung Jung, Young-Yoon Lee and Sang Uk Lee

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:358092

    Published on:

  6. Content type: Research Article

    An object-based video authentication system, which combines watermarking, error correction coding (ECC), and digital signature techniques, is presented for protecting the authenticity between video objects and...

    Authors: Dajun He, Qibin Sun and Qi Tian

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:545469

    Published on:

  7. Content type: Research Article

    There are several watermarking applications that require the deployment of a very large number of watermark embedders. These applications often have severe budgetary constraints that limit the computation reso...

    Authors: Ingemar J. Cox and Matt L. Miller

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:979753

    Published on:

  8. Content type: Research Article

    The alteration of compressed video bitstream due to embedding of digital watermark tends to produce unpredictable video bit rate variations which may in turn lead to video playback buffer overflow/underflow or...

    Authors: Sugiri Pranata, Viktor Wahadaniah, Yong Liang Guan and Hock Chuan Chua

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:953279

    Published on:

  9. Content type: Research Article

    With the popularity of high-bandwidth modems and peer-to-peer networks, the contents of videos must be highly protected from piracy. Traditionally, the models utilized to protect this kind of content are scram...

    Authors: Yann Bodo, Nathalie Laurent, Christophe Laurent and Jean-Luc Dugelay

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:298318

    Published on:

  10. Content type: Research Article

    Digital fingerprinting of multimedia data involves embedding information in the content signal and offers protection to the digital rights of the content by allowing illegitimate usage of the content to be ide...

    Authors: Z. Jane Wang, Min Wu, Wade Trappe and K.J. Ray Liu

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:237435

    Published on:

  11. Content type: Research Article

    Two watermarking algorithms for 3D nonuniform rational B-spline (NURBS) graphic data are proposed: one is appropriate for the steganography, and the other for watermarking. Instead of directly embedding data i...

    Authors: Jae Jun Lee, Nam Ik Cho and Sang Uk Lee

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:681489

    Published on:

  12. Content type: Research Article

    The majority of the existing data hiding schemes are based on the direct-sequence (DS) modulation where a low-power random sequence is embedded into the original cover signal to represent hidden information. I...

    Authors: Litao Gang, Ali N. Akansu and Mahalingam Ramkumar

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:970837

    Published on:

  13. Content type: Research Article

    Authors: Min Wu, Nasir Memon, Touradj Ebrahimi and Ingemar J. Cox

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:960474

    Published on: