-
3
-
-
33947233227
-
Security and privacy for multimedia database management systems
-
April
-
B. Thuraisingham. Security and privacy for multimedia database management systems, Multimedia Tools and Applications, 33(1): 13-29, April 2007.
-
(2007)
Multimedia Tools and Applications
, vol.33
, Issue.1
, pp. 13-29
-
-
Thuraisingham, B.1
-
4
-
-
38849104806
-
-
Dallas, Texas, USA, Pages
-
B. Thuraisingham. Multimedia systems security. Proceedings of the 9th ACM workshop on Multimedia & Security, Dallas, Texas, USA, Pages: 1-2, 2007.
-
(2007)
Multimedia systems security. Proceedings of the 9th ACM workshop on Multimedia & Security
, pp. 1-2
-
-
Thuraisingham, B.1
-
8
-
-
64249144843
-
-
Open Mobile Alliance, Digital Rights Management 2.0 (OMA DRM 2.0), 03 Mar 2006.
-
Open Mobile Alliance, Digital Rights Management 2.0 (OMA DRM 2.0), 03 Mar 2006.
-
-
-
-
13
-
-
0035279159
-
Overview of fine granularity scalability in MPEG-4 video standard
-
W. Li. Overview of fine granularity scalability in MPEG-4 video standard, IEEE Transactions on Circuits and Systems for Video Technology, 11(3): 301-317, 2001.
-
(2001)
IEEE Transactions on Circuits and Systems for Video Technology
, vol.11
, Issue.3
, pp. 301-317
-
-
Li, W.1
-
14
-
-
33750947659
-
DRM Enabled P2P Architecture
-
J. Y. Sung, J. Y. Jeong, and K. S. Yoon, "DRM Enabled P2P Architecture," 2006 International Conference on Advanced Communication Technology (ICACT2006), pp. 487-490, 2006.
-
(2006)
2006 International Conference on Advanced Communication Technology (ICACT2006)
, pp. 487-490
-
-
Sung, J.Y.1
Jeong, J.Y.2
Yoon, K.S.3
-
15
-
-
85032751422
-
Copy Protection System for Digital Home Networks
-
March
-
J.-P. Andreaux, A. Durand, T. Furon, and E. Diehl, "Copy Protection System for Digital Home Networks," IEEE Signal Processing Magazine, March 2004, pp.100-108.
-
(2004)
IEEE Signal Processing Magazine
, pp. 100-108
-
-
Andreaux, J.-P.1
Durand, A.2
Furon, T.3
Diehl, E.4
-
18
-
-
43449097890
-
Efficient video encryption scheme based on advanced video coding
-
Springer
-
S. Lian, J. Sun, G. Liu, and Z. Wang. Efficient video encryption scheme based on advanced video coding, Multimedia Tools and Applications, Springer, 38(1): 75-89, 2008.
-
(2008)
Multimedia Tools and Applications
, vol.38
, Issue.1
, pp. 75-89
-
-
Lian, S.1
Sun, J.2
Liu, G.3
Wang, Z.4
-
19
-
-
0026173255
-
Fast Fourier transform based speech encryption system
-
Speech and Vision
-
S. Sridharan, E. Dawson, and B. Goldburg. Fast Fourier transform based speech encryption system. IEE Proceedings of Communications, Speech and Vision, 138(3): 215-223, 1991.
-
(1991)
IEE Proceedings of Communications
, vol.138
, Issue.3
, pp. 215-223
-
-
Sridharan, S.1
Dawson, E.2
Goldburg, B.3
-
20
-
-
0141826787
-
Online Music Protection and MP3 Compression
-
May
-
L. Gang, A. N. Akansu, M. Ramkumar, X. Xie. Online Music Protection and MP3 Compression. In Proc. Of Int. Symposium on Intelligent Multimedia, Video and Speech Processing, May 2001, pp.13-16.
-
(2001)
Proc. Of Int. Symposium on Intelligent Multimedia, Video and Speech Processing
, pp. 13-16
-
-
Gang, L.1
Akansu, A.N.2
Ramkumar, M.3
Xie, X.4
-
21
-
-
33646144108
-
Selective bitplane encryption for secure transmission of image data in mobile environments
-
Tromso-Trondheim, Norway, October
-
M. Podesser, H. P. Schmidt, and A. Uhl, "Selective bitplane encryption for secure transmission of image data in mobile environments," In CD-ROM Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG 2002), Tromso-Trondheim, Norway, October 2002.
-
(2002)
CD-ROM Proceedings of the 5th IEEE Nordic Signal Processing Symposium (NORSIG
-
-
Podesser, M.1
Schmidt, H.P.2
Uhl, A.3
-
23
-
-
35248871615
-
Selective encryption of the JPEG2000 bitstream, IFIP International Federation for Information Processing
-
R. Norcen and A. Uhl, "Selective encryption of the JPEG2000 bitstream," IFIP International Federation for Information Processing, LNCS 2828, pp. 194-204, 2003.
-
(2003)
LNCS
, vol.2828
, pp. 194-204
-
-
Norcen, R.1
Uhl, A.2
-
24
-
-
34447252956
-
A selective image encryption scheme based on JPEG2000 Codec
-
2004 Pacific-Rim Conference on Multimedia PCM2004
-
S. Lian, J. Sun, D. Zhang, and Z. Wang. A selective image encryption scheme based on JPEG2000 Codec. 2004 Pacific-Rim Conference on Multimedia (PCM2004), Springer LNCS, 3332, 65-72, 2004.
-
(2004)
Springer LNCS
, vol.3332
, pp. 65-72
-
-
Lian, S.1
Sun, J.2
Zhang, D.3
Wang, Z.4
-
26
-
-
0030419062
-
-
L. Tang. Methods for encrypting and decrypting MPEG video data efficiently. In Proceedings of the Fourth ACM International Multimedia Conference (ACM Multimedia'96). Boston, MA, November 1996, pp. 219-230.
-
L. Tang. Methods for encrypting and decrypting MPEG video data efficiently. In Proceedings of the Fourth ACM International Multimedia Conference (ACM Multimedia'96). Boston, MA, November 1996, pp. 219-230.
-
-
-
-
28
-
-
33645966853
-
Digital Video Scrambling Method Using Intra Prediction Mode
-
2004 Pacific-Rim Conference on Multimedia PCM2004, Springer, November
-
J. Ahn, H. Shim, B. Jeon, and I. Choi. Digital Video Scrambling Method Using Intra Prediction Mode. 2004 Pacific-Rim Conference on Multimedia (PCM2004), Springer, LNCS Vol.3333, pp.386-393, November 2004.
-
(2004)
LNCS
, vol.3333
, pp. 386-393
-
-
Ahn, J.1
Shim, H.2
Jeon, B.3
Choi, I.4
-
29
-
-
0038273965
-
Efficient frequency domain selective scrambling of digital video
-
March
-
W. Zeng and S. Lei. Efficient frequency domain selective scrambling of digital video. IEEE Trans on Multimedia, 5(1): 118 -129, March 2003.
-
(2003)
IEEE Trans on Multimedia
, vol.5
, Issue.1
, pp. 118-129
-
-
Zeng, W.1
Lei, S.2
-
30
-
-
33746989201
-
Secure advanced video coding based on selective encryption algorithms
-
S. Lian, Z. Liu, Z. Ren, and H. Wang. Secure advanced video coding based on selective encryption algorithms. IEEE Transactions on Consumer Electronics, 52(2): 621-629, 2006.
-
(2006)
IEEE Transactions on Consumer Electronics
, vol.52
, Issue.2
, pp. 621-629
-
-
Lian, S.1
Liu, Z.2
Ren, Z.3
Wang, H.4
-
33
-
-
0034515656
-
-
M. Wu, E. Tang, and B. Liu, Data hiding in digital binary images, In Proc. IEEE Int'l Conf. on Multimedia and Expo, Jul 31-Aug 2, 2000, New York, NY, 393-396.
-
M. Wu, E. Tang, and B. Liu, Data hiding in digital binary images, In Proc. IEEE Int'l Conf. on Multimedia and Expo, Jul 31-Aug 2, 2000, New York, NY, 393-396.
-
-
-
-
34
-
-
8444252621
-
ICA for watermarking digital images
-
S. Bounkong, B. Toch, D. Saad, and D. Lowe, ICA for watermarking digital images, Journal of Machine Learning Research, 4(7-8): 1471-1498, 2004.
-
(2004)
Journal of Machine Learning Research
, vol.4
, Issue.7-8
, pp. 1471-1498
-
-
Bounkong, S.1
Toch, B.2
Saad, D.3
Lowe, D.4
-
35
-
-
0345565901
-
Watermarking video, hierarchical embedding in motion vectors
-
Y. Bodo, N. Laurent, and J. Dugelay, Watermarking video, hierarchical embedding in motion vectors, IEEE International Conference on Image Processing, Spain, 14-17 Sept. 2003, vol. 2, pp. 739-742.
-
(2003)
IEEE International Conference on Image Processing, Spain, 14-17 Sept
, vol.2
, pp. 739-742
-
-
Bodo, Y.1
Laurent, N.2
Dugelay, J.3
-
36
-
-
84955119830
-
-
Cambridge, UK
-
D. Gruhl, A. Lu, and W. Bender, Echo Hiding, Pre-Proceedings: Information Hiding, Cambridge, UK, 1996, pp. 295-316.
-
(1996)
Echo Hiding, Pre-Proceedings: Information Hiding
, pp. 295-316
-
-
Gruhl, D.1
Lu, A.2
Bender, W.3
-
38
-
-
0032691819
-
-
C. S. Collberg, and C. Thomborson, Software watermarking: models and dynamic embeddings, In Proc. ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL99), San Antonio, Texas, 1999, pp. 311-324.
-
C. S. Collberg, and C. Thomborson, "Software watermarking: models and dynamic embeddings," In Proc. ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL99), San Antonio, Texas, 1999, pp. 311-324.
-
-
-
-
39
-
-
84997769409
-
-
Austin, Texas, Nov
-
R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne, A digital watermark, Proc. of the IEEE Int. Conf. on Image Processing, Vol. 2, pp. 86-90, Austin, Texas, Nov. 1994.
-
(1994)
A digital watermark, Proc. of the IEEE Int. Conf. on Image Processing
, vol.2
, pp. 86-90
-
-
van Schyndel, R.G.1
Tirkel, A.Z.2
Osborne, C.F.3
-
40
-
-
0030384775
-
Techniques for data hiding
-
W. Bender, D. Gruhl, N. Morimoto, and A. Lu. Techniques for data hiding, IBM systems Journal, 35(3-4): 313-316, 1996.
-
(1996)
IBM systems Journal
, vol.35
, Issue.3-4
, pp. 313-316
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
41
-
-
23944496097
-
A multifeature based invertible authentication watermarking for JPEG Images
-
Seoul, Korea, Oct
-
D. Ye, Y. Mao, Y. Dai, and Z. Wang. A multifeature based invertible authentication watermarking for JPEG Images, Proceedings of the 3rd International Workshop on Digital Watermarking (IWDW2004), Seoul, Korea, Oct. 2004, pp. 152-162.
-
(2004)
Proceedings of the 3rd International Workshop on Digital Watermarking (IWDW2004)
, pp. 152-162
-
-
Ye, D.1
Mao, Y.2
Dai, Y.3
Wang, Z.4
-
42
-
-
0033601687
-
-
D. Coltue, and P. Bolon, Watermarking by histogram specification, In Proc. SPIE Electronic Imaging'99, Security and Watermarking of Multimedia Contents, San Jose, 1999, pp. 252-263.
-
D. Coltue, and P. Bolon, "Watermarking by histogram specification," In Proc. SPIE Electronic Imaging'99, Security and Watermarking of Multimedia Contents, San Jose, 1999, pp. 252-263.
-
-
-
-
43
-
-
0033601682
-
-
P. M. Rongen, M. B. Macs, and C. Overveld, Digital image watermarking by salient point modification, In Proc. SPIE Electronic Imaging'99, Security and Watermarking of Multimedia Content, San Jose, 1999, 3657, pp. 273-282.
-
P. M. Rongen, M. B. Macs, and C. Overveld, Digital image watermarking by salient point modification, In Proc. SPIE Electronic Imaging'99, Security and Watermarking of Multimedia Content, San Jose, 1999, vol. 3657, pp. 273-282.
-
-
-
-
44
-
-
0032072279
-
Image-adaptive watermarking using visual models
-
C. I. Podilchuk, and W. Zeng, "Image-adaptive watermarking using visual models," IEEE Journal of Selected Areas in Communication, 16(4):525-539, 1998.
-
(1998)
IEEE Journal of Selected Areas in Communication
, vol.16
, Issue.4
, pp. 525-539
-
-
Podilchuk, C.I.1
Zeng, W.2
-
45
-
-
0032069486
-
Robust audio watermarking using perceptual masking
-
M. D. Swanson, B. Zhu, A. H. Tewfik, and L. Boney. Robust audio watermarking using perceptual masking. Signal Processing, 66(3): 337-355, 1998.
-
(1998)
Signal Processing
, vol.66
, Issue.3
, pp. 337-355
-
-
Swanson, M.D.1
Zhu, B.2
Tewfik, A.H.3
Boney, L.4
-
46
-
-
0034140111
-
Joint wavelet and spatial transformation for digital watermarking
-
241~245
-
M. J. Tsai, K. Y. Yu, Y. Z. Chen. Joint wavelet and spatial transformation for digital watermarking. IEEE Trans. on Consumer Electronics, 2000, 46(1): 241~245.
-
(2000)
IEEE Trans. on Consumer Electronics
, vol.46
, Issue.1
-
-
Tsai, M.J.1
Yu, K.Y.2
Chen, Y.Z.3
-
47
-
-
33646798439
-
An ICA based algorithm for video watermarking
-
H. Joumaa, F. Davoine, "An ICA based algorithm for video watermarking," In Proc. 2005 International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005), Vol. 2, pp. 805-808.
-
Proc. 2005 International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2005)
, vol.2
, pp. 805-808
-
-
Joumaa, H.1
Davoine, F.2
-
48
-
-
85032751604
-
Collusion-resistant fingerprinting for multimedia
-
March
-
M. Wu, W. Trappe, Z. J. Wang, and R. Liu, Collusion-resistant fingerprinting for multimedia. IEEE Signal Processing Magazine, March 2004, 21(2): 15-27.
-
(2004)
IEEE Signal Processing Magazine
, vol.21
, Issue.2
, pp. 15-27
-
-
Wu, M.1
Trappe, W.2
Wang, Z.J.3
Liu, R.4
-
49
-
-
33646766143
-
-
Y. Wu, Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting, IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005 (ICASSP '05). March 18-23, 2005, 2, pp. 13-16.
-
Y. Wu, "Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting," IEEE International Conference on Acoustics, Speech, and Signal Processing, 2005 (ICASSP '05). March 18-23, 2005, Vol. 2, pp. 13-16.
-
-
-
-
50
-
-
84947900806
-
-
A. Herrigel, J. Oruanaidh, H. Petersen, S. Pereira, and T. Pun, Secure copyright protection techniques for digital images, In Second Information Hiding Workshop (IHW), LNCS 1525, Springer-Verlag, 1998, pp. 169-190.
-
A. Herrigel, J. Oruanaidh, H. Petersen, S. Pereira, and T. Pun, "Secure copyright protection techniques for digital images," In Second Information Hiding Workshop (IHW), LNCS 1525, Springer-Verlag, 1998, pp. 169-190.
-
-
-
-
51
-
-
11844303521
-
Group-oriented fingerprinting for multimedia forensics
-
Z. J. Wang, M. Wu, W. Trappe, and K. J. R. Liu, "Group-oriented fingerprinting for multimedia forensics," EURASIP Journal on Applied Signal Processing, 2004(4) 2153-2173, 2004.
-
(2004)
EURASIP Journal on Applied Signal Processing
, vol.2004
, Issue.4
, pp. 2153-2173
-
-
Wang, Z.J.1
Wu, M.2
Trappe, W.3
Liu, K.J.R.4
-
52
-
-
0032162672
-
Collusion-secure fingerprinting for digital data
-
Sept
-
D. Boneh, and J. Shaw, Collusion-secure fingerprinting for digital data, IEEE Trans. Inform. Theory, 44 (5): 1897-1905, Sept. 1998.
-
(1998)
IEEE Trans. Inform. Theory
, vol.44
, Issue.5
, pp. 1897-1905
-
-
Boneh, D.1
Shaw, J.2
-
54
-
-
33749625961
-
Collusion-resistant international de-synchronization for digital video fingerprinting
-
Y. Mao, and M. K. Mihcak, "Collusion-resistant international de-synchronization for digital video fingerprinting," IEEE Conference on Image Processing, 2005, vol. 1, pp. 237-240.
-
(2005)
IEEE Conference on Image Processing
, vol.1
, pp. 237-240
-
-
Mao, Y.1
Mihcak, M.K.2
-
55
-
-
38349014901
-
Collusion-resistant fingerprinting scheme based on the CDMA-technique
-
Second International Workshop on Security IWSEC
-
N. Hayashi, M. Kuribayashi, and M. Morii, Collusion-resistant fingerprinting scheme based on the CDMA-technique, Second International Workshop on Security (IWSEC 2007), LNCS 4752, pp. 28-43, 2007.
-
(2007)
LNCS
, vol.4752
, pp. 28-43
-
-
Hayashi, N.1
Kuribayashi, M.2
Morii, M.3
-
57
-
-
64249139952
-
-
S. Lian. Traitor tracing in mobile multimedia communication. In Handbook of Research on Mobile Multimedia (2nd edition), edited by Ismail Khalil Ibrahim. IGI Global, 2008.
-
S. Lian. Traitor tracing in mobile multimedia communication. In "Handbook of Research on Mobile Multimedia" (2nd edition), edited by Ismail Khalil Ibrahim. IGI Global, 2008.
-
-
-
-
58
-
-
64249145769
-
-
D. Simitopoulos, N. Zissis, P. Georgiadis, V. Emmanouilidis and M. G. Strintzis. Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD, ACM Informatica 33 (2009) 3-24 23 Multimedia Systems Journal, Special Issue on Multimedia Security, 9(3), 217-227, Sep. 2003.
-
D. Simitopoulos, N. Zissis, P. Georgiadis, V. Emmanouilidis and M. G. Strintzis. Encryption and watermarking for the secure distribution of copyrighted MPEG video on DVD, ACM Informatica 33 (2009) 3-24 23 Multimedia Systems Journal, Special Issue on Multimedia Security, 9(3), 217-227, Sep. 2003.
-
-
-
-
59
-
-
84957663275
-
Watercasting: Distributed watermarking of multicast media
-
Proceedings of International Workshop on Networked Group Communication, Springer-Verlag
-
I. Brown, C. Perkins, and J. Crowcroft. Watercasting: Distributed watermarking of multicast media. In Proceedings of International Workshop on Networked Group Communication, Springer-Verlag LNCS, 1736, pp. 286-300, 1999.
-
(1999)
LNCS
, vol.1736
, pp. 286-300
-
-
Brown, I.1
Perkins, C.2
Crowcroft, J.3
-
60
-
-
85143191445
-
-
J. Bloom, Security and rights management in digital cinema, in Proc. IEEE Int. Conf. Acoustic, Speech and Signal Processing, 4, pp. 712-715, 2003.
-
J. Bloom, "Security and rights management in digital cinema," in Proc. IEEE Int. Conf. Acoustic, Speech and Signal Processing, Vol. 4, pp. 712-715, 2003.
-
-
-
-
62
-
-
30144437180
-
Fingerprint multicast in secure video streaming
-
H. V. Zhao, K. J. R. Liu, Fingerprint multicast in secure video streaming. IEEE Transactions on Image Processing, 15(1), 12-29, 2006.
-
(2006)
IEEE Transactions on Image Processing
, vol.15
, Issue.1
, pp. 12-29
-
-
Zhao, H.V.1
Liu, K.J.R.2
-
63
-
-
84947921901
-
Chamleon - a new kind of stream cipher
-
Springer-Verlag, pp
-
R. Anderson and C. Manifavas. Chamleon - a new kind of stream cipher. LNCS, Fast Software Encryption, Springer-Verlag, pp. 107-113, 1997.
-
(1997)
LNCS, Fast Software Encryption
, pp. 107-113
-
-
Anderson, R.1
Manifavas, C.2
-
64
-
-
11144253373
-
Video fingerprinting and encryption principles for digital rights management
-
D. Kundur and K. Karthik, "Video fingerprinting and encryption principles for digital rights management," Proceedings of the IEEE, 92(6): 918-932, 2004.
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 918-932
-
-
Kundur, D.1
Karthik, K.2
-
65
-
-
78649879843
-
Secure Distribution Scheme for Compressed Data Streams
-
Oct
-
S. Lian, Z. Liu, Z. Ren, and H. Wang, "Secure Distribution Scheme for Compressed Data Streams," 2006 IEEE Conference on Image Processing (ICIP 2006), Oct 2006, pp. 1953-1956.
-
(2006)
2006 IEEE Conference on Image Processing (ICIP 2006)
, pp. 1953-1956
-
-
Lian, S.1
Liu, Z.2
Ren, Z.3
Wang, H.4
-
66
-
-
33845398262
-
Secure watermark embedding through partial encryption
-
Proceedings of International Workshop on Digital Watermarking IWDW 2006
-
A. N. Lemma, S. Katzenbeisser, M. U. Celik, and M. V. Veen. Secure watermark embedding through partial encryption. Proceedings of International Workshop on Digital Watermarking (IWDW 2006), Springer LNCS, 4283, 433-445, 2006.
-
(2006)
Springer LNCS
, vol.4283
, pp. 433-445
-
-
Lemma, A.N.1
Katzenbeisser, S.2
Celik, M.U.3
Veen, M.V.4
-
67
-
-
0032223822
-
A robust image authentication algorithm surviving JPEG lossy compression
-
C.-Y. Lin and S.-F. Chang. A robust image authentication algorithm surviving JPEG lossy compression. In SPIE Storage and Retrieval of Image/Video Databases, Vol. 3312, pp. 296-307 (1998).
-
(1998)
SPIE Storage and Retrieval of Image/Video Databases
, vol.3312
, pp. 296-307
-
-
Lin, C.-Y.1
Chang, S.-F.2
-
68
-
-
51849119078
-
Overview of stateof-the-art in digital image forensics, Book chapter, Part of Indian Statistical Institute Platinum Jubilee Monograph series titled
-
World Scientific Press
-
H. T. Sencar and N. Memon, Overview of stateof-the-art in digital image forensics, Book chapter, Part of Indian Statistical Institute Platinum Jubilee Monograph series titled 'Statistical Science and Interdisciplinary Research,' World Scientific Press (2008).
-
(2008)
Statistical Science and Interdisciplinary Research
-
-
Sencar, H.T.1
Memon, N.2
-
69
-
-
13244251141
-
Exposing digital forgeries by detecting traces of re-sampling
-
A. C. Popescu and H. Farid. Exposing digital forgeries by detecting traces of re-sampling, IEEE Trans. Signal Processing, 53(2): 758-767 (2005).
-
(2005)
IEEE Trans. Signal Processing
, vol.53
, Issue.2
, pp. 758-767
-
-
Popescu, A.C.1
Farid, H.2
-
70
-
-
27844493797
-
Exposing digital forgeries in color filter array interpolated images
-
A. C. Popescu and H. Farid. Exposing digital forgeries in color filter array interpolated images, IEEE Trans. Signal Processing, 53(10): 3948-3959 (2005).
-
(2005)
IEEE Trans. Signal Processing
, vol.53
, Issue.10
, pp. 3948-3959
-
-
Popescu, A.C.1
Farid, H.2
-
71
-
-
38849195462
-
Exposing digital forgeries in video by detecting double MPEG compression
-
September 26-27, Geneva, Switzerland
-
W. Wang, and H. Farid. Exposing digital forgeries in video by detecting double MPEG compression, Proceedings of the 9th workshop on Multimedia & security (MM& Sec'06), September 26-27, 2006, Geneva, Switzerland (2006), pp. 35-42.
-
(2006)
Proceedings of the 9th workshop on Multimedia & security (MM& Sec'06)
, pp. 35-42
-
-
Wang, W.1
Farid, H.2
-
74
-
-
27844554394
-
Detection of copy-move forgery in digital images
-
Cleveland, OH, USA
-
J. Fridrich, D. Soukal, and J. Lukas. Detection of copy-move forgery in digital images. In Proceedings of 2003 Digital Forensic Research Workshop (2003), Cleveland, OH, USA, 2003, http://www.ws.binghamton.edu/fridrich/ Research/copymove.pdf.
-
(2003)
Proceedings of 2003 Digital Forensic Research Workshop
-
-
Fridrich, J.1
Soukal, D.2
Lukas, J.3
-
75
-
-
33750910780
-
Exposing digital forgeries in scientific images
-
September 26-27, Geneva, Switzerland, pp
-
H. Farid. Exposing digital forgeries in scientific images. ACM MM& Sec'06, September 26-27, 2006, Geneva, Switzerland, pp. 29 - 36.
-
(2006)
ACM MM& Sec'06
, pp. 29-36
-
-
Farid, H.1
-
76
-
-
84928742468
-
Discriminant local features selection using efficient density estimation in a large database
-
New York
-
A. Joly and O. Buisson. Discriminant local features selection using efficient density estimation in a large database, in Proc. ACM Int. workshop on Multimedia information retrieval, pp. 201-208, New York, 2005.
-
(2005)
Proc. ACM Int. workshop on Multimedia information retrieval
, pp. 201-208
-
-
Joly, A.1
Buisson, O.2
-
77
-
-
0035591459
-
Content-based retrieval using local descriptors: Problems and issues from a database perspective
-
L. Amsaleg and P. Gros. Content-based retrieval using local descriptors: Problems and issues from a database perspective, Pattern Anal. Appl., 4(2-3): 108-124, 2001.
-
(2001)
Pattern Anal. Appl
, vol.4
, Issue.2-3
, pp. 108-124
-
-
Amsaleg, L.1
Gros, P.2
-
78
-
-
0033340192
-
Searching near-replicas of images via clustering
-
E. Y. Chang, C. Li, J.-Z. Wang, P. Mork, and G. Wiederhold. Searching near-replicas of images via clustering, in Proc. SPIE: Multimedia Storage and Archiving Systems IV, 1999, vol. 3846, pp. 281-92.
-
(1999)
Proc. SPIE: Multimedia Storage and Archiving Systems IV
, vol.3846
, pp. 281-292
-
-
Chang, E.Y.1
Li, C.2
Wang, J.-Z.3
Mork, P.4
Wiederhold, G.5
-
79
-
-
0037372152
-
Content-based image copy detection
-
C. Kim. Content-based image copy detection, Signal Processing: Image Communication, 18(3): 169-184, 2003.
-
(2003)
Signal Processing: Image Communication
, vol.18
, Issue.3
, pp. 169-184
-
-
Kim, C.1
-
80
-
-
33646832581
-
Image copy detection with rotating tolerance
-
CIS, Springer, pp
-
M. Wu, C. Lin, and C. Chang. Image copy detection with rotating tolerance, In CIS 2005, Part I, LNAI 3801, Springer, pp. 464-469, 2005.
-
(2005)
LNAI
, vol.3801
, Issue.PART I
, pp. 464-469
-
-
Wu, M.1
Lin, C.2
Chang, C.3
-
81
-
-
33745160704
-
A robust content-based copy detection scheme
-
IOS Press
-
M.-N. Wu, C.-C. Lin, C. Chang. A robust content-based copy detection scheme, Fundamenta Informaticae 71(2-3): 351-366, IOS Press, 2006.
-
(2006)
Fundamenta Informaticae
, vol.71
, Issue.2-3
, pp. 351-366
-
-
Wu, M.-N.1
Lin, C.-C.2
Chang, C.3
-
83
-
-
34547747797
-
A new approach to image copy detection based on extended feature sets
-
August
-
J.-H. Hsiao, C.-S. Chen, L.-F. Chien, M.-S. Chen. A new approach to image copy detection based on extended feature sets. IEEE Trans. Image Process, 16(8): 2069-2079, August 2007.
-
(2007)
IEEE Trans. Image Process
, vol.16
, Issue.8
, pp. 2069-2079
-
-
Hsiao, J.-H.1
Chen, C.-S.2
Chien, L.-F.3
Chen, M.-S.4
-
84
-
-
11844281385
-
State-ofthe-art in privacy preserving data mining
-
V. S. Verykios, E. Bertino, I. N. Fovino, L. P. Provenza, Y. Saygin, Y. Theodoridis. State-ofthe-art in privacy preserving data mining, SIGMOD Record, 33(1): 50-57, 2004.
-
(2004)
SIGMOD Record
, vol.33
, Issue.1
, pp. 50-57
-
-
Verykios, V.S.1
Bertino, E.2
Fovino, I.N.3
Provenza, L.P.4
Saygin, Y.5
Theodoridis, Y.6
-
85
-
-
2142754478
-
-
V. S. Verykios, A. K. Elmagarmid, E. Bertino, Y. Saygin, andE. Dasseni. Association rule hiding, IEEE Transactions on Knowledge and Data Engineering, 16(4): 434-447, 2004.
-
V. S. Verykios, A. K. Elmagarmid, E. Bertino, Y. Saygin, andE. Dasseni. Association rule hiding, IEEE Transactions on Knowledge and Data Engineering, 16(4): 434-447, 2004.
-
-
-
-
86
-
-
0344990562
-
Using unknowns to prevent discovery of association rules
-
Y. Saygin, V. Verykios, and C. Clifton, Using unknowns to prevent discovery of association rules, SIGMOD Record, 30(4): 45-54, 2001.
-
(2001)
SIGMOD Record
, vol.30
, Issue.4
, pp. 45-54
-
-
Saygin, Y.1
Verykios, V.2
Clifton, C.3
-
88
-
-
0242709355
-
-
J. Vaidya and . Clifton, Privacy preserving association rule mining in vertically partitioned data, In the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2002), pp. 639-644.
-
J. Vaidya and . Clifton, Privacy preserving association rule mining in vertically partitioned data, In the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2002), pp. 639-644.
-
-
-
-
92
-
-
0242625281
-
-
A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, Privacy preserving mining of association rules, In Proceedings of the 8th ACM SIGKDDD International Conference on Knowledge Discovery and Data Mining (2002), pp. 217-228.
-
A. Evfimievski, R. Srikant, R. Agrawal, and J. Gehrke, Privacy preserving mining of association rules, In Proceedings of the 8th ACM SIGKDDD International Conference on Knowledge Discovery and Data Mining (2002), pp. 217-228.
-
-
-
-
93
-
-
64249167264
-
-
Biometrics. http://en.wikipedia.org/wiki/Biometrics.
-
Biometrics
-
-
-
94
-
-
33744779400
-
Biometrics: A tool for information security
-
June
-
A. K. Jain, A. Ross, and S. Pankanti. Biometrics: A tool for information security. IEEE Transactions On Information Forensics and Security, 1(2): 125- 143, June 2006.
-
(2006)
IEEE Transactions On Information Forensics and Security
, vol.1
, Issue.2
, pp. 125-143
-
-
Jain, A.K.1
Ross, A.2
Pankanti, S.3
-
95
-
-
64249141307
-
-
M. Krause and H. F. Tipton. Characteristics of Biometric Systems. In Handbook of Information Security Management. CRC Press, pp. 39-41.
-
M. Krause and H. F. Tipton. "Characteristics of Biometric Systems". In Handbook of Information Security Management. CRC Press, pp. 39-41.
-
-
-
-
96
-
-
64249100859
-
-
P. J. Philips, P. Grother, R. J. Micheals, D. M. Blackburn, E. Tabassi, and J. M. Bone. Face recognition vendor test 2002: Overview and Summary. http://www.frvt.org/DLs/FRVT-2002-Overview-and-Summary.pdf, March 2003.
-
P. J. Philips, P. Grother, R. J. Micheals, D. M. Blackburn, E. Tabassi, and J. M. Bone. Face recognition vendor test 2002: Overview and Summary. http://www.frvt.org/DLs/FRVT-2002-Overview-and-Summary.pdf, March 2003.
-
-
-
-
97
-
-
33744735809
-
Fingerprint vendor technology evaluation 2003: Summary of results and analysis report
-
Jun
-
C. Wilson, A. R. Hicklin, H. Korves, B. Ulery, M. Zoepfl, M. Bone, P. Grother, R. J. Micheals, S. Otto, and C. Watson, Fingerprint vendor technology evaluation 2003: summary of results and analysis report, NIST Internal Rep. 7123, Jun. 2004.
-
(2004)
NIST Internal Rep
, vol.7123
-
-
Wilson, C.1
Hicklin, A.R.2
Korves, H.3
Ulery, B.4
Zoepfl, M.5
Bone, M.6
Grother, P.7
Micheals, R.J.8
Otto, S.9
Watson, C.10
-
98
-
-
42749100093
-
Implementation of Hand Geometry at Purdue University's Recreational Center: An Analysis of User Perspectives and System Performance
-
11-14 Oct
-
E. Kukula, and S. Elliott, Implementation of Hand Geometry at Purdue University's Recreational Center: An Analysis of User Perspectives and System Performance, IEEE 2005, The 39th Annual 2005 International Carnahan Conference on Security Technology (CCST'05), 11-14 Oct. 2005, pp. 83-88.
-
(2005)
IEEE 2005, The 39th Annual 2005 International Carnahan Conference on Security Technology (CCST'05)
, pp. 83-88
-
-
Kukula, E.1
Elliott, S.2
-
99
-
-
0034809453
-
Enhancing security and privacy in biometricsbased authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle. Enhancing security and privacy in biometricsbased authentication systems, IBM systems Journal, 40(3): 614-634, 2001.
-
(2001)
IBM systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
100
-
-
0038223829
-
-
NIST SP 800-31, Online
-
NIST SP 800-31, Intrusion Detection Systems.(Online) http://csrc.nist.gov/-publications/nistpubs/index.html
-
Intrusion Detection Systems
-
-
-
103
-
-
64249137408
-
-
J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, and E. Stoner. State of the Practice of Intrusion Detection Technologies. TECHNICAL REPORT, CMU/SEI-99-TR-028, ESC-99-028, January 2000.
-
J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, and E. Stoner. State of the Practice of Intrusion Detection Technologies. TECHNICAL REPORT, CMU/SEI-99-TR-028, ESC-99-028, January 2000.
-
-
-
-
104
-
-
64249160896
-
-
R. Shane, The Trusted Computing Platform Emerges as Industry's First Comprehensive Approach to IT Security, 2006. (online) https://www.trustedcomputinggroup.org/news/Industry-Data/IDC-448-Web.pdf.
-
R. Shane, "The Trusted Computing Platform Emerges as Industry's First Comprehensive Approach to IT Security", 2006. (online) https://www.trustedcomputinggroup.org/news/Industry-Data/IDC-448-Web.pdf.
-
-
-
-
105
-
-
53349159971
-
Digital Watermarking and Steganography
-
2nd Edition
-
I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker. Digital Watermarking and Steganography, 2nd Edition, The Morgan Kaufmann Series in Multimedia Information and Systems, 2007.
-
(2007)
The Morgan Kaufmann Series in Multimedia Information and Systems
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
Fridrich, J.4
Kalker, T.5
-
106
-
-
54349087136
-
Digital Rights Management for the Home TV based on scalable video coding
-
August
-
S. Lian. Digital Rights Management for the Home TV based on scalable video coding. IEEE Transactions on Consumer Electronics, 54(3): 1287-1293, August 2008.
-
(2008)
IEEE Transactions on Consumer Electronics
, vol.54
, Issue.3
, pp. 1287-1293
-
-
Lian, S.1
-
108
-
-
34250017964
-
Commutative encryption and watermarking in compressed video data
-
June
-
S. Lian, Z. Liu, Z. Ren, and H. Wang. Commutative encryption and watermarking in compressed video data. IEEE Circuits and Systems for Video Technology, 17(6): 774-778, June 2007.
-
(2007)
IEEE Circuits and Systems for Video Technology
, vol.17
, Issue.6
, pp. 774-778
-
-
Lian, S.1
Liu, Z.2
Ren, Z.3
Wang, H.4
-
111
-
-
3543105519
-
-
W. Hu, T. Tan, and S. Maybank. A survey on visual surveillance of object motion and behaviors. IEEE Trans. on Systems, Man and Cybernetics-Part C: Applications and Reviews, 34(3): 334-352, 2004.
-
W. Hu, T. Tan, and S. Maybank. A survey on visual surveillance of object motion and behaviors. IEEE Trans. on Systems, Man and Cybernetics-Part C: Applications and Reviews, 34(3): 334-352, 2004.
-
-
-
|