Skip to main content

Advertisement

Multimedia Security and Rights Management

  1. There are several watermarking applications that require the deployment of a very large number of watermark embedders. These applications often have severe budgetary constraints that limit the computation reso...

    Authors: Ingemar J. Cox and Matt L. Miller

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:979753

    Content type: Research Article

    Published on:

  2. The majority of the existing data hiding schemes are based on the direct-sequence (DS) modulation where a low-power random sequence is embedded into the original cover signal to represent hidden information. I...

    Authors: Litao Gang, Ali N. Akansu and Mahalingam Ramkumar

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:970837

    Content type: Research Article

    Published on:

  3. Authors: Min Wu, Nasir Memon, Touradj Ebrahimi and Ingemar J. Cox

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:960474

    Content type: Research Article

    Published on:

  4. The alteration of compressed video bitstream due to embedding of digital watermark tends to produce unpredictable video bit rate variations which may in turn lead to video playback buffer overflow/underflow or...

    Authors: Sugiri Pranata, Viktor Wahadaniah, Yong Liang Guan and Hock Chuan Chua

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:953279

    Content type: Research Article

    Published on:

  5. Two watermarking algorithms for 3D nonuniform rational B-spline (NURBS) graphic data are proposed: one is appropriate for the steganography, and the other for watermarking. Instead of directly embedding data i...

    Authors: Jae Jun Lee, Nam Ik Cho and Sang Uk Lee

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:681489

    Content type: Research Article

    Published on:

  6. Many systems have been proposed for protecting the intellectual property of multimedia authors and owners from the public at large, who have access to the multimedia only after it is published. In this paper, ...

    Authors: Nicholas Paul Sheppard, Reihaneh Safavi-Naini and Philip Ogunbona

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:657830

    Content type: Research Article

    Published on:

  7. An object-based video authentication system, which combines watermarking, error correction coding (ECC), and digital signature techniques, is presented for protecting the authenticity between video objects and...

    Authors: Dajun He, Qibin Sun and Qi Tian

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:545469

    Content type: Research Article

    Published on:

  8. Watermarking for video sequences should consider additional attacks, such as frame averaging, frame-rate change, frame shuffling or collusion attacks, as well as those of still images. Also, since video is a s...

    Authors: Han-Seung Jung, Young-Yoon Lee and Sang Uk Lee

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:358092

    Content type: Research Article

    Published on:

  9. To ensure secure content delivery, the Motion Picture Experts Group (MPEG) has dedicated significant effort to the digital rights management (DRM) issues. MPEG is now moving from defining only hooks to proprie...

    Authors: Ming Ji, SM Shen, Wenjun Zeng, Taka Senoh, Takafumi Ueno, Terumasa Aoki, Yasuda Hiroshi and Takuyo Kogure

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:303278

    Content type: Research Article

    Published on:

  10. With the popularity of high-bandwidth modems and peer-to-peer networks, the contents of videos must be highly protected from piracy. Traditionally, the models utilized to protect this kind of content are scram...

    Authors: Yann Bodo, Nathalie Laurent, Christophe Laurent and Jean-Luc Dugelay

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:298318

    Content type: Research Article

    Published on:

  11. Digital fingerprinting of multimedia data involves embedding information in the content signal and offers protection to the digital rights of the content by allowing illegitimate usage of the content to be ide...

    Authors: Z. Jane Wang, Min Wu, Wade Trappe and K.J. Ray Liu

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:237435

    Content type: Research Article

    Published on:

  12. Digital image content authentication addresses the problem of detecting any illegitimate modification on the content of images. To cope with this problem, a novel semifragile watermarking scheme using the pinned ...

    Authors: Anthony T.S. Ho, Xunzhan Zhu and Yong Liang Guan

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:185761

    Content type: Research Article

    Published on:

  13. In recent years a number of wavelet-based watermarking schemes have been proposed and exhibited improved qualities. The choice of a wavelet filter bank for a digital watermarking scheme can have a significant ...

    Authors: Martin Dietze and Sabah Jassim

    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:130901

    Content type: Research Article

    Published on: