Digital watermarks enabling e-commerce strategies: conditional and user specific access to services and resources

J Dittmann, M Steinebach, P Wohlmacher… - EURASIP Journal on …, 2002 - Springer
… In our paper, we have introduced and discussed conditional access mechanisms for
annotation watermarks. We have presented our approaches for conditional access solutions that …

[PDF][PDF] Beyond Cryptographic Conditional Access.

DM Goldschlag, DW Kravitz - Smartcard, 1999 - usenix.org
conditional access system, where instead of protecting content directly, the content’s identity
is inserted as a watermark in … display device to display watermarked content. This approach …

Conditional and user specific access to services and resources using annotation watermarks

J Dittmann, P Wohlmacher, R Ackermann - … Issues of the New Century: IFIP …, 2001 - Springer
… In our paper we have introduced and discussed conditional access mechanisms for
annotation watermarks. We have presented our approaches for conditional access solutions, that …

A novel triple recovery information embedding approach for self-embedded digital image watermarking

E Gul, S Ozturk - Multimedia Tools and applications, 2020 - Springer
… In order to detect and recover high tampering rated images, this paper presents a novel
self-embedded fragile watermarking method with triple recovery information embedding …

Layered access control schemes on watermarked scalable media

FC Chang, HC Huang, HM Hang - The Journal of VLSI Signal Processing …, 2007 - Springer
… Overall, the layered protection structure proposed in this paper is a reliable method that
meets the conditional access and layered coding requirements at the same time. The detailed …

Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications

S Craver, N Memon, BL Yeo… - IEEE Journal on Selected …, 1998 - ieeexplore.ieee.org
… to embed robust watermarks in digital images does not necessarily imply the ability to
establish ownership, unless certain requirements are imposed on the watermarking schemes. In …

Layered access control schemes on watermarked scalable media

FC Chang, HC Huang, HM Hang - 2005 IEEE International …, 2005 - ieeexplore.ieee.org
… robust digital watermarking methods [10] to reinforce the robustness of the embedded
key … that meets the conditional access and layered coding requirements at the same time. …

A novel conditional access architecture for TV service protection

J Liu, C Yang, J Tian - 2007 International Conference on …, 2007 - ieeexplore.ieee.org
watermark is used to provide conditional playing of TS. In dual-CA front-end, the watermark
is embedded before … In user dual-CA agent, the watermark is extracted by the corresponding …

Watermarking of MPEG-4 video objects

M Barni, F Bartolini, N Checcacci - IEEE Transactions on …, 2005 - ieeexplore.ieee.org
watermarking technology, since it can enable a number of innovative services, such as
conditional access … One of the key points of the MPEG-4 standard is the possibility to access and …

Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques

WN Lie, GS Lin, SL Cheng - IEEE Transactions on Information …, 2006 - ieeexplore.ieee.org
… accept raw image data as input and embed watermark signals in the transform domain
without … Similar to [24], we utilize the Wiener filter to estimate the embedded watermark signal. …