An overview of digital video watermarking

M Asikuzzaman, MR Pickering - IEEE Transactions on Circuits …, 2017 - ieeexplore.ieee.org
The illegal distribution of a digital movie is a common and significant threat to the film
industry. With the advent of high-speed broadband Internet access, a pirated copy of a …

Vlogging: A survey of videoblogging technology on the web

W Gao, Y Tian, T Huang, Q Yang - Acm Computing Surveys (Csur), 2010 - dl.acm.org
In recent years, blogging has become an exploding passion among Internet communities.
By combining the grassroots blogging with the richness of expression available in video …

A survey of data marketplaces and their business models

SA Azcoitia, N Laoutaris - ACM SIGMOD Record, 2022 - dl.acm.org
Data is becoming an indispensable production factor for the modern economy, matching or
exceeding in importance traditional factors such as land, infrastructure, labor and capital. As …

A new approach to Persian/Arabic text steganography

MH Shirali-Shahreza… - 5th IEEE/ACIS …, 2006 - ieeexplore.ieee.org
Conveying information secretly and establishing hidden relationship has been of interest
since long past. Text documents have been widely used since very long time ago. Therefore …

A robust watermarking scheme in YCbCr color space based on channel coding

Y Tan, J Qin, X Xiang, W Ma, W Pan, NN Xiong - IEEE Access, 2019 - ieeexplore.ieee.org
The rapid development of big data and cloud computing technologies greatly accelerate the
spreading and utilization of images and videos. The copyright protection for images and …

Data lineage in malicious environments

M Backes, N Grimm, A Kate - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Intentional or unintentional leakage of confidential data is undoubtedly one of the most
severe security threats that organizations face in the digital era. The threat now extends to …

Advances in digital video content protection

EI Lin, AM Eskicioglu, RL Lagendijk… - Proceedings of the …, 2005 - ieeexplore.ieee.org
The use of digital video offers immense opportunities for creators; however, the ability for
anyone to make perfect copies and the ease by which those copies can be distributed also …

[Retracted] AGTH‐Net: Attention‐Based Graph Convolution‐Guided Third‐Order Hourglass Network for Sports Video Classification

M Gao, W Cai, R Liu - Journal of Healthcare Engineering, 2021 - Wiley Online Library
As a hot research topic, sports video classification research has a wide range of applications
in switched TV, video on demand, smart TV, and other fields and is closely related to …

A novel Arabic text steganography method using letter points and extensions

A Gutub, M Fattani - 2007 - eprints.kfupm.edu.sa
This paper presents a new steganography approach suitable for Arabic texts. It can be
classified under steganography feature coding methods. The approach hides secret …

Imperceptible and robust blind video watermarking using chrominance embedding: A set of approaches in the DT CWT domain

M Asikuzzaman, MJ Alam, AJ Lambert… - IEEE transactions on …, 2014 - ieeexplore.ieee.org
Illegal distribution of a digital movie is a significant threat to the film industries. With the
advent of high-speed broadband Internet access, a pirated copy of a digital video can be …