A Survey on Multimedia Content Protection Mechanisms
نویسندگان
چکیده
منابع مشابه
De-identification for privacy protection in multimedia content: A survey
Privacy is one of the most important social and political issues in our information society, characterized by a growing range of enabling and supporting technologies and services. Amongst these are communications, multimedia, biometrics, big data, cloud computing, data mining, internet, social networks, and audio–video surveillance. Each of these can potentially provide the means for privacy in...
متن کاملA Survey on P2P Content Delivery Mechanisms
3 Content Type 4 3.1 File/elastic Content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 3.2 Streaming Content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 3.2.1 Stored Streaming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 3.2.2 Live Streaming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 3.3 Comparison . ...
متن کاملA Survey on Content-Based Retrieval for Multimedia Databases
Conventional database systems are designed for managing textual and numerical data, and retrieving such data is often based on simple comparisons of text/numerical values. However, this simple method of retrieval is no longer adequate for the multimedia data, since the digitized representation of images, video, or data itself does not convey the reality of these media items. In addition, compos...
متن کاملMultimedia Protection Using Content and Embedded Fingerprints
Title of dissertation: MULTIMEDIA PROTECTION USING CONTENT AND EMBEDDED FINGERPRINTS Avinash Laxmisha Varna, Doctor of Philosophy, 2011 Dissertation directed by: Professor Min Wu Department of Electrical and Computer Engineering Improved digital connectivity has made the Internet an important medium for multimedia distribution and consumption in recent years. At the same time, this increased pr...
متن کاملMultimedia content protection via biometrics-based encryption
We propose a multimedia content protection framework that is based on biometric data of the users and a layered encryption/decryption scheme. Password-only encryption schemes are vulnerable to illegal key exchange problems. By using biometric data along with hardware identifiers as keys, it is possible to alleviate fraudulent usage of protected content. A combination of symmetric and asymmetric...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Electrical and Computer Engineering (IJECE)
سال: 2018
ISSN: 2088-8708,2088-8708
DOI: 10.11591/ijece.v8i6.pp4204-4211