Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








17 Hits in 5.5 sec

An Audio Watermark Designed for Efficient and Robust Resynchronization After Analog Playback

Andrew Nadeau, Gaurav Sharma
2017 IEEE Transactions on Information Forensics and Security  
We propose a spread spectrum (SS) audio watermark designed to withstand analog playback, including desynchronization caused by small differences between playback and recording rates.  ...  Additionally, compared with a recent baseline scheme that uses brute force resampling to search for resynchronization, the proposed watermark is 300 times more computationally efficient, and does not compromise  ...  CONCLUSION AND DISCUSSION This paper proposes a novel audio watermarking technique specifically designed to provide computationally efficient resynchronization after analog playback.  ... 
doi:10.1109/tifs.2017.2661724 fatcat:ozhzjghkuvhdhiyw3ntjd7of3i

Audio watermarking robust against D/A and A/D conversions

Shijun Xiang
2011 EURASIP Journal on Advances in Signal Processing  
Digital audio watermarking robust against digital-to-analog (D/A) and analog-to-digital (A/D) conversions is an important issue.  ...  For the TSM, the synchronization technique (with synchronization codes and an interpolation processing operation) is exploited.  ...  the additive noise corruption, the watermark is inserted into the lowest frequency subband of DWT domain. 3) The resynchronization step via synchronization codes and an interpolation operation is designed  ... 
doi:10.1186/1687-6180-2011-3 fatcat:ez3detrduvb5zidlam4sh4o7ke

Streaming video and rate-scalable compression: What are the challenges for watermarking?

Eugene T. Lin, Christine I. Podilchuk, Ton Kalker, Edward J. Delp III, Ping W. Wong, Edward J. Delp III
2001 Security and Watermarking of Multimedia Contents III  
with the compression method and data transport and be robust to errors.  ...  Many watermarking techniques have been proposed for digital images and video, but the issues of streaming have not been fully investigated.  ...  For embedded scalability modes, one could design a watermark analogous to an embedded coding scheme, where the most significant structures of the watermark are placed near the beginning of the video stream  ... 
doi:10.1117/12.435391 dblp:conf/sswmc/LinPKD01 fatcat:5ov2qpdigvhi7jqpudz3f5rlii

Streaming video and rate scalable compression: what are the challenges for watermarking?

Christine I. Podilchuk
2004 Journal of Electronic Imaging (JEI)  
with the compression method and data transport and be robust to errors.  ...  Many watermarking techniques have been proposed for digital images and video, but the issues of streaming have not been fully investigated.  ...  For embedded scalability modes, one could design a watermark analogous to an embedded coding scheme, where the most significant structures of the watermark are placed near the beginning of the video stream  ... 
doi:10.1117/1.1632499 fatcat:u2ynx65f5fgw5mzb7kelxui66q

Audio Watermarking for Security and Non-Security Applications

Maha Charfeddine, Eya Mezghani, Salma Masmoudi, Chokri Ben Amar, Hesham Alhumyani
2022 IEEE Access  
Experimentations proved the efficiency of exploiting perceptual masking with spectral envelope consideration in terms of imperceptibility and robustness results.  ...  In this scheme, extracted watermark will advise about the audio class: music or speech, the speaker gender and emotion.  ...  ACKNOWLEDGMENT This research was supported by Taif University Researchers Supporting Project number (TURSP-2020/216), Taif University, Taif, Saudi Arabia for supporting this work.  ... 
doi:10.1109/access.2022.3145950 fatcat:kkawupgcjrdotpag3uwhycgxou

Multimedia data-embedding and watermarking technologies

M.D. Swanson, M. Kobayashi, A.H. Tewfik
1998 Proceedings of the IEEE  
In this paper, we review recent developments in transparent data embedding and watermarking for audio, image, and video.  ...  Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal.  ...  In [4] and [87] , the authors present an audio watermarking algorithm that exploits temporal and frequency masking (see Section IV-A) to embed robust and inaudible data.  ... 
doi:10.1109/5.687830 fatcat:dtyaqys2xrdrpkq2tri77kzrzi

Multimedia Data-Embedding and Watermarking Technologies Manuscript received July 15, 1997; revised January 15, 1998. The Guest Editor coordinating the review of this paper and approving it for publication was A. M. Tekalp. This work was supported in part by the Air Force Office of Scientific Research under Grant AF/F49620-94-1-0461 and in part by the Advanced Research Project Agency under Grant AF/F49620-93-1-0558.Publisher Item Identifier S 0018-9219(98)03519-1 [chapter]

MITCHELL D. SWANSON, MEI KOBAYASHI, AHMED H. TEWFIK
2002 Readings in Multimedia Computing and Networking  
In this paper, we review recent developments in transparent data embedding and watermarking for audio, image, and video.  ...  Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal.  ...  In [4] and [87] , the authors present an audio watermarking algorithm that exploits temporal and frequency masking (see Section IV-A) to embed robust and inaudible data.  ... 
doi:10.1016/b978-155860651-7/50098-x fatcat:pr7j4jk4q5hxjltrqcs2uakkaq

Exploiting self-similarities to defeat digital watermarking systems

Gwenaël Doërr, Jean-Luc Dugelay, Lucas Grangé
2004 Proceedings of the 2004 multimedia and security workshop on Multimedia and security - MM&Sec '04  
In an effort to anticipate hostile behaviors of adversaries, the research community is constantly introducing novel attacks to benchmark watermarking systems.  ...  Unauthorized digital copying is a major concern for multimedia content providers.  ...  , and thus a more efficient attack after remodulation.  ... 
doi:10.1145/1022431.1022455 dblp:conf/mmsec/DoerrDG04 fatcat:xjzsja6h6rcw7ciosvoc6skvdm

INFORMATION-THEORETIC DATA-HIDING: RECENT ACHIEVEMENTS AND OPEN PROBLEMS

SVIATOSLAV VOLOSHYNOVSKIY, FREDERIC DEGUILLAUME, OLEKSIY KOVAL, THIERRY PUN
2005 International Journal of Image and Graphics  
Finally, we demonstrate the possible extensions of this theory for watermark-assisted multimedia processing and indicate its perspectives for distributed communications.  ...  Secondly, we formulate digital data-hiding into visual content as communications with side information and advocate an appropriate informationtheoretic framework for the analysis of different data-hiding  ...  The authors are thankful to Yuriy Rytsar for many helpful and interesting discussions.  ... 
doi:10.1142/s0219467805001641 fatcat:fwt723y6znaoportlfewwvgdly

Information Forensics and Security: A quarter-century-long journey [article]

Mauro Barni and Patrizio Campisi and Edward J. Delp and Gwenael Doërr and Jessica Fridrich and Nasir Memon and Fernando Pérez-González and Anderson Rocha and Luisa Verdoliva and Min Wu
2023 arXiv   pre-print
Information Forensics and Security (IFS) is an active R&D area whose goal is to ensure that people use devices, data, and intellectual properties for authorized purposes and to facilitate the gathering  ...  The IEEE Signal Processing Society (SPS) has emerged as an important hub and leader in this area, and the article below celebrates some landmark technical contributions.  ...  This is particularly relevant when watermarking is used for copy or playback control, and relevant countermeasures must be implemented.  ... 
arXiv:2309.12159v1 fatcat:b63earpxefdkpatbsozfanfvcy

Fundamentals of Multimedia Encryption Techniques [chapter]

Borko Furht, Daniel Socek, Ahmet Eskicioglu
2006 Multimedia Encryption and Authentication Techniques and Applications  
SELECTIVE VIDEO ENCRYPTION In order to meet real-time constraint for audio and video multimedia playback, selective encryption techniques have been proposed.  ...  Aegis was initially designed for MPEG-1 and MPEG-2 video standards. Aegis method encrypts I-frames of all MPEG groups of frames in an MPEG video stream, while B-and Pframes are left unencrypted.  ... 
doi:10.1201/9781420013450.ch3 fatcat:nsorx5x2w5fmregu2cblj6jb5a

Fundamentals of Multimedia Encryption Techniques [chapter]

Ahmet Eskicioglu, Daniel Socek, Borko Furht
2004 Internet and Communications  
SELECTIVE VIDEO ENCRYPTION In order to meet real-time constraint for audio and video multimedia playback, selective encryption techniques have been proposed.  ...  Aegis was initially designed for MPEG-1 and MPEG-2 video standards. Aegis method encrypts I-frames of all MPEG groups of frames in an MPEG video stream, while B-and Pframes are left unencrypted.  ... 
doi:10.1201/9781420038262.pt2 fatcat:2rqtmiz6hfgbnc5xmmtkpmltau

On the applications of multimedia processing to communications

R.V. Cox, B.G. Haskell, Y. LeCun, B. Shahraray, L. Rabiner
1998 Proceedings of the IEEE  
The network is not well suited for sending real-time communication signals, however, such as speech, audio, and video.  ...  A key problem with packet networks is that they were not designed to handle voice traffic.  ...  Quackenbush (audio coding), P. Howard (fax and image coding), A. Puri, J. Ostermann, T. Chen, and A.  ... 
doi:10.1109/5.664272 fatcat:yhn4kb3mmbctbbfus7br26oox4

Information-theoretic data-hiding for public network security, services control and secure communications

S. Voloshynovskiy, F. Deguillaume, O. Koval, T. Pun
6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service, 2003. TELSIKS 2003.  
Finally, we demonstrate the possible extensions of this theory for watermark-assisted multimedia processing and indicate its perspectives for distributed networks.  ...  Secondly, we formulate digital data hiding as communications with side information and advocate an appropriate information-theoretic framework for the analysis of different data hiding methods in various  ...  The authors are thankful to Yuriy Rytsar for many helpful and interesting discussions.  ... 
doi:10.1109/telsks.2003.1246174 fatcat:vfsebkaoebf7vkznspasmt44sy

Advanced Copyright Issues on the Internet

David L. Hayes
2016 Social Science Research Network  
activities, if (i) the infringing activities do not involve the provision of online access to instructional materials that are or were required or recommended, within the preceding three-year period, for  ...  The right of transmission and access under Article 8 of the WIPO Copyright Treaty is similar to (and potentially broader than) the amendment to U.S. copyright law proposed in the NII White Paper "to expressly  ...  recording device, a digital audio recording medium, an analog recording device, or an analog recording medium, or based on the noncommercial use by a consumer of such a device or medium for making digital  ... 
doi:10.2139/ssrn.2847799 fatcat:etak54ffgbcmzhwoh63znk2o4i
« Previous Showing results 1 — 15 out of 17 results