Watermarking of uncompressed and compressed video
Signal Processing
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Weaknesses in the Key Scheduling Algorithm of RC4
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Statistical Analysis of the Alleged RC4 Keystream Generator
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
A Practical Attack on Broadcast RC4
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Modeling and implementation of digital rights
Journal of Systems and Software
E.cient Aggregation of encrypted data in Wireless Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
Anonymous fingerprinting with robust QIM watermarking techniques
EURASIP Journal on Information Security
Attacks on the RC4 stream cipher
Designs, Codes and Cryptography
Designs, Codes and Cryptography
New Results on the Key Scheduling Algorithm of RC4
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
An efficient buyer-seller watermarking protocol based on composite signal representation
Proceedings of the 11th ACM workshop on Multimedia and security
Privacy preserving multiparty multilevel DRM architecture
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Joint watermarking scheme for multiparty multilevel DRM architecture
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Composite signal representation for fast and storage-efficient processing of encrypted signals
IEEE Transactions on Information Forensics and Security
Joint watermarking and encryption of color images in the Fibonacci-Haar domain
EURASIP Journal on Advances in Signal Processing
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol
Information Sciences: an International Journal
Anti-collusion fingerprinting for multimedia
IEEE Transactions on Signal Processing
A mathematical analysis of the DCT coefficient distributions for images
IEEE Transactions on Image Processing
A joint signal processing and cryptographic approach to multimedia encryption
IEEE Transactions on Image Processing
Hi-index | 0.00 |
Digital media is often handled in a compressed and encrypted form in Digital Asset Management Systems (DAMS). Therefore, watermarking of these compressed encrypted media items in the compressedencrypted domain itself is required for copyright violation detection or other purposes. Compression process might compactly pack the raw data of the media and encryption would randomize the compressed data. Thus, embedding a watermark in such a compressed randomized data can cause a dramatic degradation of the media quality. Towards this, the encryption of the compressed media should be such that, it is both secure and will allow watermarking in a predictable manner in the compressed encrypted domain. Further, the encryption mechanism should be such that the bit rate overhead is considerably low as compared to the original compressed VLC codestream. In this paper, we propose a robust watermarking algorithm to watermark JPEG partially compressed and encrypted images, encrypted using a stream cipher. While the proposed technique embeds watermark in the partially compressed-encrypted domain, the extraction of watermark can be done in the encrypted, decrypted or decompressed domain.