Standards compliant watermarking for access management
نویسندگان
چکیده
We present standards-compliant visible watermarking schemes for digital images and video in DCT-based compressed formats. The watermarked data is in the same compressed format as the original and can be viewed with standard tools and applications. Moreover, for most of the schemes presented, the watermarked data has exactly the same compressed size as the original. The watermark can be inserted and removed using a key for applications requiring content protection. The watermark application and removal algorithms are very efficient and exploit some features of compressed data formats (such as JPEG and MPEG) which allow most of the work to be done in the compressed domain.
منابع مشابه
On Privacy-compliant Disclosure of Personal Data to Third Parties using Digital Watermarking
Privacy in business processes for providing personalized services is currently a matter of trust. Business processes require the disclosure of personal data to third parties and users are not able to control their usage and so their further disclosure. Existing privacy-enhancing technologies consider access control but not usage control of personal data. The current work on usage control mainly...
متن کاملExtending NFSv4 for Petascale Data Management
Designed with Internet data management in mind, NFSv4 is meeting the needs of widely distributed col-laborations. Anticipating terascale and petascale HPC demands, NFSv4 architects are designing pNFS, a standard extension that supports parallel access to cluster file systems, object stores, and massive SANs. In combination with advances in optical networking, pNFS decouples computing from stora...
متن کاملFormat-Compliant Selective Scrambling for Multimedia Access Control
We present a framework for access control of standardcompliant compressed video and audio bitstreams for entertainment purposes. This includes format compliant selective encryption and compliance-preserving secure spatial shuffling. The approach leverages well-known encryption algorithms, has low complexity, and maintains standard-compliance of the encrypted bitstream. The standard compliance f...
متن کاملDial Control Management Information Base using SMIv2
Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This memo defines a portion of t...
متن کاملFundamental performance limits of power-spectrum condition-compliant watermarks
Our previous work introduced a stochastic framework for studying watermarking. When the receiver used direct correlation detection and the attack employed linear shift-invariant (LSI) ltering, the optimal attack consisted of Wiener ltering and adding noise. Resisting the Wiener attack led to a power-spectrum condition (PSC): the watermark and original power spectra should be directly proportion...
متن کامل