Skip to main content

Multimedia Security and Rights Management

  1. There are several watermarking applications that require the deployment of a very large number of watermark embedders. These applications often have severe budgetary constraints that limit the computation reso...

    Authors: Ingemar J. Cox and Matt L. Miller
    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:979753
  2. The majority of the existing data hiding schemes are based on the direct-sequence (DS) modulation where a low-power random sequence is embedded into the original cover signal to represent hidden information. I...

    Authors: Litao Gang, Ali N. Akansu and Mahalingam Ramkumar
    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:970837
  3. Authors: Min Wu, Nasir Memon, Touradj Ebrahimi and Ingemar J. Cox
    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:960474
  4. The alteration of compressed video bitstream due to embedding of digital watermark tends to produce unpredictable video bit rate variations which may in turn lead to video playback buffer overflow/underflow or...

    Authors: Sugiri Pranata, Viktor Wahadaniah, Yong Liang Guan and Hock Chuan Chua
    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:953279
  5. Two watermarking algorithms for 3D nonuniform rational B-spline (NURBS) graphic data are proposed: one is appropriate for the steganography, and the other for watermarking. Instead of directly embedding data i...

    Authors: Jae Jun Lee, Nam Ik Cho and Sang Uk Lee
    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:681489
  6. Many systems have been proposed for protecting the intellectual property of multimedia authors and owners from the public at large, who have access to the multimedia only after it is published. In this paper, ...

    Authors: Nicholas Paul Sheppard, Reihaneh Safavi-Naini and Philip Ogunbona
    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:657830
  7. An object-based video authentication system, which combines watermarking, error correction coding (ECC), and digital signature techniques, is presented for protecting the authenticity between video objects and...

    Authors: Dajun He, Qibin Sun and Qi Tian
    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:545469
  8. Watermarking for video sequences should consider additional attacks, such as frame averaging, frame-rate change, frame shuffling or collusion attacks, as well as those of still images. Also, since video is a s...

    Authors: Han-Seung Jung, Young-Yoon Lee and Sang Uk Lee
    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:358092
  9. To ensure secure content delivery, the Motion Picture Experts Group (MPEG) has dedicated significant effort to the digital rights management (DRM) issues. MPEG is now moving from defining only hooks to proprie...

    Authors: Ming Ji, SM Shen, Wenjun Zeng, Taka Senoh, Takafumi Ueno, Terumasa Aoki, Yasuda Hiroshi and Takuyo Kogure
    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:303278
  10. With the popularity of high-bandwidth modems and peer-to-peer networks, the contents of videos must be highly protected from piracy. Traditionally, the models utilized to protect this kind of content are scram...

    Authors: Yann Bodo, Nathalie Laurent, Christophe Laurent and Jean-Luc Dugelay
    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:298318
  11. Digital fingerprinting of multimedia data involves embedding information in the content signal and offers protection to the digital rights of the content by allowing illegitimate usage of the content to be ide...

    Authors: Z. Jane Wang, Min Wu, Wade Trappe and K.J. Ray Liu
    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:237435
  12. Digital image content authentication addresses the problem of detecting any illegitimate modification on the content of images. To cope with this problem, a novel semifragile watermarking scheme using the pinned ...

    Authors: Anthony T.S. Ho, Xunzhan Zhu and Yong Liang Guan
    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:185761
  13. In recent years a number of wavelet-based watermarking schemes have been proposed and exhibited improved qualities. The choice of a wavelet filter bank for a digital watermarking scheme can have a significant ...

    Authors: Martin Dietze and Sabah Jassim
    Citation: EURASIP Journal on Advances in Signal Processing 2004 2004:130901