[PDF][PDF] All aspects of digital video watermarking under an umbrella

R Ahuja, SS Bedi - International Journal of Image, Graphics and …, 2015 - mecs-press.org
The present review covers the video watermarking literature published from 1997 to the year
2015. Through extensive work, some selection is necessary. Therefore, only articles …

一种基于秘密共享与运动矢量的视频水印算法

徐甲甲, 张卫明, 俞能海, 郭宝安, 钱杨春 - 电子学报, 2012 - ejournal.org.cn
本文在" 压缩嵌入联合编码" 框架下, 提出一种基于秘密共享和信息分级保护的水印生成算法.
与用算术编码压缩水印相比, 本文的秘密共享方案在保证水印可认证性的前提下大幅度减少了 …

Proof of storage for video deduplication in the cloud

F Rashid, A Miri, I Woungang - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
With the advent of cloud computing and its technologies, including data deduplication, more
freedom are offered to the users in terms of cloud storage, processing power and efficiency …

A joint source-channel adaptive scheme for wireless H. 264/AVC video authentication

X Zhu, CW Chen - IEEE Transactions on Information Forensics …, 2015 - ieeexplore.ieee.org
Authentication has become an emerging issue for video streaming over lossy networks.
Although the advanced video coding standards, such as H. 264/AVC, efficiently reduce the …

A secure video deduplication scheme in cloud storage environments using h. 264 compression

F Rashid, A Miri, I Woungang - 2015 IEEE First International …, 2015 - ieeexplore.ieee.org
Due to the rapidly increasing amounts of digital data produced worldwide, multi-user cloud
storage systems are becoming very popular and Internet users are approaching cloud …

Content fragile watermarking for H. 264/AVC video authentication

K Ait Sadi, A Guessoum, A Bouridane… - International Journal of …, 2017 - Taylor & Francis
Discrete cosine transform is exploited in this work to generate the authentication data that
are treated as a fragile watermark. This watermark is embedded in the motion vectors. The …

A noble reversible data embedding method for source authentication and tamper detection of H. 264/AVC video

S Maiti, MP Singh - … on Emerging Trends in Networks and …, 2011 - ieeexplore.ieee.org
Authentication of multimedia content is required to proof the data integrity and establish the
identity of the content creator. In this paper, we propose a source authentication and tamper …

利用WebM 視訊做資訊隱藏及其應用之研究

曾新翔, 蔡文祥 - 2011 - ir.lib.nycu.edu.tw
隨著網路以及視訊壓縮技術的進步, 數位影片已經成為我們生活中的一部分. WebM 是Google
公司所開放免版權費用的開源視訊格式, WebM 針對影片在網路上的使用做最佳化 …

Conceptual modeling: a critical survey and a few perspectives

C Esculier, O Friesen - Proceedings International Phoenix …, 1995 - ieeexplore.ieee.org
The ANSI/X3/SPARC architecture is a basic component of the database technology.
Conceptual modeling is a major element of database design. After twenty years of use a …

Secure Data Deduplication in Cloud Environments

F Rashid - 2015 - rshare.library.torontomu.ca
With the tremendous growth of available digital data, the use of Cloud Service Providers
(CSPs) are gaining more popularity, since these types of services promise to provide …