A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Audio Watermark Designed for Efficient and Robust Resynchronization After Analog Playback
2017
IEEE Transactions on Information Forensics and Security
We propose a spread spectrum (SS) audio watermark designed to withstand analog playback, including desynchronization caused by small differences between playback and recording rates. ...
Additionally, compared with a recent baseline scheme that uses brute force resampling to search for resynchronization, the proposed watermark is 300 times more computationally efficient, and does not compromise ...
CONCLUSION AND DISCUSSION This paper proposes a novel audio watermarking technique specifically designed to provide computationally efficient resynchronization after analog playback. ...
doi:10.1109/tifs.2017.2661724
fatcat:ozhzjghkuvhdhiyw3ntjd7of3i
Audio watermarking robust against D/A and A/D conversions
2011
EURASIP Journal on Advances in Signal Processing
Digital audio watermarking robust against digital-to-analog (D/A) and analog-to-digital (A/D) conversions is an important issue. ...
For the TSM, the synchronization technique (with synchronization codes and an interpolation processing operation) is exploited. ...
the additive noise corruption, the watermark is inserted into the lowest frequency subband of DWT domain. 3) The resynchronization step via synchronization codes and an interpolation operation is designed ...
doi:10.1186/1687-6180-2011-3
fatcat:ez3detrduvb5zidlam4sh4o7ke
Streaming video and rate-scalable compression: What are the challenges for watermarking?
2001
Security and Watermarking of Multimedia Contents III
with the compression method and data transport and be robust to errors. ...
Many watermarking techniques have been proposed for digital images and video, but the issues of streaming have not been fully investigated. ...
For embedded scalability modes, one could design a watermark analogous to an embedded coding scheme, where the most significant structures of the watermark are placed near the beginning of the video stream ...
doi:10.1117/12.435391
dblp:conf/sswmc/LinPKD01
fatcat:5ov2qpdigvhi7jqpudz3f5rlii
Streaming video and rate scalable compression: what are the challenges for watermarking?
2004
Journal of Electronic Imaging (JEI)
with the compression method and data transport and be robust to errors. ...
Many watermarking techniques have been proposed for digital images and video, but the issues of streaming have not been fully investigated. ...
For embedded scalability modes, one could design a watermark analogous to an embedded coding scheme, where the most significant structures of the watermark are placed near the beginning of the video stream ...
doi:10.1117/1.1632499
fatcat:u2ynx65f5fgw5mzb7kelxui66q
Audio Watermarking for Security and Non-Security Applications
2022
IEEE Access
Experimentations proved the efficiency of exploiting perceptual masking with spectral envelope consideration in terms of imperceptibility and robustness results. ...
In this scheme, extracted watermark will advise about the audio class: music or speech, the speaker gender and emotion. ...
ACKNOWLEDGMENT This research was supported by Taif University Researchers Supporting Project number (TURSP-2020/216), Taif University, Taif, Saudi Arabia for supporting this work. ...
doi:10.1109/access.2022.3145950
fatcat:kkawupgcjrdotpag3uwhycgxou
Multimedia data-embedding and watermarking technologies
1998
Proceedings of the IEEE
In this paper, we review recent developments in transparent data embedding and watermarking for audio, image, and video. ...
Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal. ...
In [4] and [87] , the authors present an audio watermarking algorithm that exploits temporal and frequency masking (see Section IV-A) to embed robust and inaudible data. ...
doi:10.1109/5.687830
fatcat:dtyaqys2xrdrpkq2tri77kzrzi
Multimedia Data-Embedding and Watermarking Technologies Manuscript received July 15, 1997; revised January 15, 1998. The Guest Editor coordinating the review of this paper and approving it for publication was A. M. Tekalp. This work was supported in part by the Air Force Office of Scientific Research under Grant AF/F49620-94-1-0461 and in part by the Advanced Research Project Agency under Grant AF/F49620-93-1-0558.Publisher Item Identifier S 0018-9219(98)03519-1
[chapter]
2002
Readings in Multimedia Computing and Networking
In this paper, we review recent developments in transparent data embedding and watermarking for audio, image, and video. ...
Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal. ...
In [4] and [87] , the authors present an audio watermarking algorithm that exploits temporal and frequency masking (see Section IV-A) to embed robust and inaudible data. ...
doi:10.1016/b978-155860651-7/50098-x
fatcat:pr7j4jk4q5hxjltrqcs2uakkaq
Exploiting self-similarities to defeat digital watermarking systems
2004
Proceedings of the 2004 multimedia and security workshop on Multimedia and security - MM&Sec '04
In an effort to anticipate hostile behaviors of adversaries, the research community is constantly introducing novel attacks to benchmark watermarking systems. ...
Unauthorized digital copying is a major concern for multimedia content providers. ...
, and thus a more efficient attack after remodulation. ...
doi:10.1145/1022431.1022455
dblp:conf/mmsec/DoerrDG04
fatcat:xjzsja6h6rcw7ciosvoc6skvdm
INFORMATION-THEORETIC DATA-HIDING: RECENT ACHIEVEMENTS AND OPEN PROBLEMS
2005
International Journal of Image and Graphics
Finally, we demonstrate the possible extensions of this theory for watermark-assisted multimedia processing and indicate its perspectives for distributed communications. ...
Secondly, we formulate digital data-hiding into visual content as communications with side information and advocate an appropriate informationtheoretic framework for the analysis of different data-hiding ...
The authors are thankful to Yuriy Rytsar for many helpful and interesting discussions. ...
doi:10.1142/s0219467805001641
fatcat:fwt723y6znaoportlfewwvgdly
Information Forensics and Security: A quarter-century-long journey
[article]
2023
arXiv
pre-print
Information Forensics and Security (IFS) is an active R&D area whose goal is to ensure that people use devices, data, and intellectual properties for authorized purposes and to facilitate the gathering ...
The IEEE Signal Processing Society (SPS) has emerged as an important hub and leader in this area, and the article below celebrates some landmark technical contributions. ...
This is particularly relevant when watermarking is used for copy or playback control, and relevant countermeasures must be implemented. ...
arXiv:2309.12159v1
fatcat:b63earpxefdkpatbsozfanfvcy
Fundamentals of Multimedia Encryption Techniques
[chapter]
2006
Multimedia Encryption and Authentication Techniques and Applications
SELECTIVE VIDEO ENCRYPTION In order to meet real-time constraint for audio and video multimedia playback, selective encryption techniques have been proposed. ...
Aegis was initially designed for MPEG-1 and MPEG-2 video standards. Aegis method encrypts I-frames of all MPEG groups of frames in an MPEG video stream, while B-and Pframes are left unencrypted. ...
doi:10.1201/9781420013450.ch3
fatcat:nsorx5x2w5fmregu2cblj6jb5a
Fundamentals of Multimedia Encryption Techniques
[chapter]
2004
Internet and Communications
SELECTIVE VIDEO ENCRYPTION In order to meet real-time constraint for audio and video multimedia playback, selective encryption techniques have been proposed. ...
Aegis was initially designed for MPEG-1 and MPEG-2 video standards. Aegis method encrypts I-frames of all MPEG groups of frames in an MPEG video stream, while B-and Pframes are left unencrypted. ...
doi:10.1201/9781420038262.pt2
fatcat:2rqtmiz6hfgbnc5xmmtkpmltau
On the applications of multimedia processing to communications
1998
Proceedings of the IEEE
The network is not well suited for sending real-time communication signals, however, such as speech, audio, and video. ...
A key problem with packet networks is that they were not designed to handle voice traffic. ...
Quackenbush (audio coding), P. Howard (fax and image coding), A. Puri, J. Ostermann, T. Chen, and A. ...
doi:10.1109/5.664272
fatcat:yhn4kb3mmbctbbfus7br26oox4
Information-theoretic data-hiding for public network security, services control and secure communications
6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service, 2003. TELSIKS 2003.
Finally, we demonstrate the possible extensions of this theory for watermark-assisted multimedia processing and indicate its perspectives for distributed networks. ...
Secondly, we formulate digital data hiding as communications with side information and advocate an appropriate information-theoretic framework for the analysis of different data hiding methods in various ...
The authors are thankful to Yuriy Rytsar for many helpful and interesting discussions. ...
doi:10.1109/telsks.2003.1246174
fatcat:vfsebkaoebf7vkznspasmt44sy
Advanced Copyright Issues on the Internet
2016
Social Science Research Network
activities, if (i) the infringing activities do not involve the provision of online access to instructional materials that are or were required or recommended, within the preceding three-year period, for ...
The right of transmission and access under Article 8 of the WIPO Copyright Treaty is similar to (and potentially broader than) the amendment to U.S. copyright law proposed in the NII White Paper "to expressly ...
recording device, a digital audio recording medium, an analog recording device, or an analog recording medium, or based on the noncommercial use by a consumer of such a device or medium for making digital ...
doi:10.2139/ssrn.2847799
fatcat:etak54ffgbcmzhwoh63znk2o4i
« Previous
Showing results 1 — 15 out of 17 results