Watermarking of Compressed and Encrypted JPEG Images
Abstract
Keywords
Full Text:
PDFReferences
[1].A.V.Subramanyam, Sabu Emmanuel, “Robust Watermarking of compressed and encrypted JPEG2000 images” IEEE Trans pp 703-716,2012
S. Hwang, K. Yoon,K. Jun, andK. Lee, “Modeling and implementation of digital rights,” J. Syst. Softw., vol. 73, no. 3, pp. 533–549, 2004.
A. Sachan, S. Emmanuel, A. Das, and M.S. Kankanhalli, “Privacy Preserving multiparty multilevel lDRM architecture,” in Proc. 6th IEEE Consumer Communications and Networking Conf., Workshop Digital Rights Management, 2009, pp. 1–5.
T. Thomas, S. Emmanuel, A. Subramanyam, and M. Kankanhalli, “Joint watermarking scheme for multiparty multilevel DRM architecture,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 758–767,
A. Subramanyam, S. Emmanuel, and M. Kankanhalli, “Compressedencrypted domain JPEG2000 image watermarking,” in Proc. IEEE Int. Conf. Multimedia and Expo, 2010, pp. 1315–1320.
H. Wu and D.Ma, “Efficient and secure encryption schemes for JPEG 2000,” in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, 2004, vol. 5, pp. 869– 872.
M. Deng, T. Bianchi,A. Piva, and B. Preneel, “An efficient buyer-seller watermarking protocol based on composite signal representation,” in Proc. 11th ACM Workshop Multimedia and Security, 2009, pp. 9–18.
T. Bianchi, A. Piva, and M. Barni, “Composite signal representation for fast and storage-efficient processing of encrypted signals,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180– 187, Mar. 2010.
A. Subramanyam, S. Emmanuel, and M. Kankanhalli, “Compressedencrypted domain JPEG2000 image watermarking,” in Proc. IEEE Int. Conf. Multimedia and Expo, 2010, pp. 1315–1320.
H. Wu and D.Ma, “Efficient and secure encryption schemes for JPEG 2000,” in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, 2004, vol. 5, pp. 869– 872.
M. Deng, T. Bianchi,A. Piva, and B. Preneel, “An efficient buyer-seller watermarking protocol based on composite signal representation,” in Proc. 11th ACM Workshop Multimedia and Security, 2009, pp. 9–18.
T. Bianchi, A. Piva, and M. Barni, “Composite signal representation for fast and storage-efficient processing of encrypted signals,” IEEE Trans. Inf. Forensics Security, vol. 5, no. 1, pp. 180– 187, Mar. 2010.
S. Lian, Z. Liu, R. Zhen, and H. Wang, “Commutative watermarking and encryption for media data,” Opt. Eng., vol. 45, pp. 1–3, 2006.
F. Battisti, M. Cancellaro, G. Boato, M. Carli, and A. Neri, “Joint watermarking and encryption of color images in the Fibonacci-Haar domain,” EURASIP J. Adv. Signal Process. vol. 2009.
M. Cancellaro, F. Battisti, M. Carli, G. Boato, F. De Natale, and A. Neri, “A joint digital watermarking and encryption method,” in Proc. SPIE Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, 2008, vol. 6819, pp. 68 191C–68 191C.
J. Prins, Z. Erkin, and R. Lagendijk, “Anonymous fingerprinting with robust QIM watermarking techniques,” EURASIP J. Inf. Security, vol. 2007.
Z. Li, X. Zhu, Y. Lian, and Q. Sun, “Constructing secure content dependent watermarking scheme using homomorphic
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.