Standards compliant watermarking for access management

نویسندگان

  • Viresh Ratnakar
  • Onur G. Guleryuz
چکیده

We present standards-compliant visible watermarking schemes for digital images and video in DCT-based compressed formats. The watermarked data is in the same compressed format as the original and can be viewed with standard tools and applications. Moreover, for most of the schemes presented, the watermarked data has exactly the same compressed size as the original. The watermark can be inserted and removed using a key for applications requiring content protection. The watermark application and removal algorithms are very efficient and exploit some features of compressed data formats (such as JPEG and MPEG) which allow most of the work to be done in the compressed domain.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking

Privacy in business processes for providing personalized services is currently a matter of trust. Business processes require the disclosure of personal data to third parties and users are not able to control their usage and so their further disclosure. Existing privacy-enhancing technologies consider access control but not usage control of personal data. The current work on usage control mainly...

متن کامل

Extending NFSv4 for Petascale Data Management

Designed with Internet data management in mind, NFSv4 is meeting the needs of widely distributed col-laborations. Anticipating terascale and petascale HPC demands, NFSv4 architects are designing pNFS, a standard extension that supports parallel access to cluster file systems, object stores, and massive SANs. In combination with advances in optical networking, pNFS decouples computing from stora...

متن کامل

Format-Compliant Selective Scrambling for Multimedia Access Control

We present a framework for access control of standardcompliant compressed video and audio bitstreams for entertainment purposes. This includes format compliant selective encryption and compliance-preserving secure spatial shuffling. The approach leverages well-known encryption algorithms, has low complexity, and maintains standard-compliance of the encrypted bitstream. The standard compliance f...

متن کامل

Dial Control Management Information Base using SMIv2

Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo defines a portion of t...

متن کامل

Fundamental performance limits of power-spectrum condition-compliant watermarks

Our previous work introduced a stochastic framework for studying watermarking. When the receiver used direct correlation detection and the attack employed linear shift-invariant (LSI) ltering, the optimal attack consisted of Wiener ltering and adding noise. Resisting the Wiener attack led to a power-spectrum condition (PSC): the watermark and original power spectra should be directly proportion...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001