scispace - formally typeset
Proceedings ArticleDOI

Watermarking-based copyright protection of Internet-delivered multimedia

Reads0
Chats0
TLDR
A new system is presented which exploits state-of-the-art watermarking technology to enable IPR protection in open-network environments and is an object-oriented one: at any given time, the information needed to prove the legal/illegal use of the data is hidden within the data itself, whereas no attempt is made to trace previous abuses.
Citations
More filters

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Proceedings ArticleDOI

Text based geometric normalization for robust watermarking of digital maps

TL;DR: The peculiarities of digital map images are exploited to develop a watermarking algorithm which is robust against geometric distortions and exhibits an excellent robustness, as is witnessed by the experimental results reported.
Proceedings ArticleDOI

A New Watermarking Protocol of Copyright Protection

TL;DR: A new watermarking protocol proposed in this article uses three watermarks in structure, which sets up a hiberarchy of digital copyright authorities to protect rights, defends ambiguity attacks and collusive attacks, and resolves the non-repudiation problem and CS overload problem.
Proceedings ArticleDOI

A New Watermarking Protocol of Copyright Protection

Zhang, +3 more
References
More filters

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal ArticleDOI

Multimedia data-embedding and watermarking technologies

TL;DR: The reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream are discussed.
Journal ArticleDOI

Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications

TL;DR: It is shown that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone, and existing techniques are attacked by providing counterfeit water marking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership.
Proceedings ArticleDOI

Review of watermarking and the importance of perceptual modeling

TL;DR: The desirable characteristics of digital watermarking are outlined and several recent approaches that address these issues are discussed.
Proceedings ArticleDOI

Effective and ineffective digital watermarks

TL;DR: A number of proposed image-watermarking application scenarios are described and form a small number of watermark-application categories, and the desired technical properties of watermarks for each category are discussed.
Related Papers (5)