An overview of digital video watermarking

M Asikuzzaman, MR Pickering - IEEE Transactions on Circuits …, 2017 - ieeexplore.ieee.org
The illegal distribution of a digital movie is a common and significant threat to the film
industry. With the advent of high-speed broadband Internet access, a pirated copy of a …

Twenty years of digital audio watermarking—a comprehensive review

G Hua, J Huang, YQ Shi, J Goh, VLL Thing - Signal processing, 2016 - Elsevier
Digital audio watermarking is an important technique to secure and authenticate audio
media. This paper provides a comprehensive review of the twenty years' research and …

Power normalized cepstral robust features of deep neural networks in a cloud computing data privacy protection scheme

M Li, Z Tian, X Du, X Yuan, C Shan, M Guizani - Neurocomputing, 2023 - Elsevier
Abstract Deep Neural Networks (DNNs) have developed rapidly in data privacy protection
applications such as medical treatment and finance. However, DNNs require high-speed …

A recent survey on multimedia and database watermarking

S Kumar, BK Singh, M Yadav - Multimedia Tools and Applications, 2020 - Springer
In today's digital era, it is very easy to copy, manipulate and distribute multimedia data over
an open channel. Copyright protection, content authentication, identity theft, and ownership …

Digital Watermarking: State of the Art and Research Challenges in Health Care & Multimedia Applications

E Kumaraswamy, GM Kumar… - IOP Conference …, 2020 - iopscience.iop.org
Nowadays the multimedia data easily available to most people. It is the main cause of illegal
access to multimedia content, theft of the intellectual property, easily copying and …

M-sequences and sliding window based audio watermarking robust against large-scale cropping attacks

G Zhang, L Zheng, Z Su, Y Zeng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Large-scale cropping (LSC) is one of the mostly-used operations in desynchronization
attacks and can easily destroy the watermark information by deleting continuous audio …

SNR-constrained heuristics for optimizing the scaling parameter of robust audio watermarking

Z Su, G Zhang, F Yue, L Chang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
In spread spectrum (SS) based robust audio watermarking, the scaling parameter is an
important factor for balancing between robustness and imperceptibility. There have been …

A zero-watermarking algorithm for privacy protection in biomedical signals

Z Ali, M Imran, M Alsulaiman, T Zia, M Shoaib - Future Generation …, 2018 - Elsevier
Confidentiality of health information is indispensable to protect privacy of an individual.
However, recent advances in electronic healthcare systems allow transmission of sensitive …

A dual-embedded tamper detection framework based on block truncation coding for intelligent multimedia systems

M Li, C Liu, C Shan, H Song, Z Lv - Information Sciences, 2023 - Elsevier
The rich intelligent multimedia systems provide great convenience and efficiency.
Unfortunately, it faces a series of security challenges and threats in developing and …

A four-dimensional space-based data multi-embedding mechanism for network services

M Li, H Cui, C Liu, C Shan, X Du… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In the age of data science and connected devices of all kinds, users have gained a lot of
convenience. However, the massive data generated by users from the communication …