Chameleon - A New Kind of Stream Cipher
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Watercasting: Distributed Watermarking of Multicast Media
NGC '99 Proceedings of the First International COST264 Workshop on Networked Group Communication
Digital Watermarking of MPEG-2 Coded Video in the Bitstream Domain
ICASSP '97 Proceedings of the 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '97) -Volume 4 - Volume 4
A watermarking-based image ownership and tampering authentication scheme
Pattern Recognition Letters
Reversible steganographic method using SMVQ approach based on declustering
Information Sciences: an International Journal
Application of Principal Component Analysis to Multikey Searching
IEEE Transactions on Software Engineering
Multimedia Content Encryption: Techniques and Applications
Multimedia Content Encryption: Techniques and Applications
Prediction-based watermarking schemes using ahead/post AC prediction
Signal Processing
Secure watermark embedding through partial encryption
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Lookup-Table-Based Secure Client-Side Embedding for Spread-Spectrum Watermarks
IEEE Transactions on Information Forensics and Security
Commutative Encryption and Watermarking in Video Compression
IEEE Transactions on Circuits and Systems for Video Technology
A novel JFE scheme for social multimedia distribution in compressed domain using SVD and CA
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.08 |
With the popularity of the Internet and development of multimedia technology, media distribution and traitor tracing issues have become critical and urgent. In this paper, a joint fingerprinting and decryption (JFD) scheme based on vector quantization is proposed with the purpose of protecting media distribution. The proposed JFD scheme is equipped with two encryption techniques, which are performed on the server side. The first technique encrypts plain-images using static key-trees, but the second approach uses dynamic key-trees to further simplify the first method. When the subscriber receives the encrypted images, these images are jointly decrypted and fingerprinted and are slightly different from the original images. The proposed method, to the best of our knowledge, is the first JFD method for vector quantization (VQ) compressed images. The experimental results show that the encrypted image is unintelligible and that the recovered image has desirable image quality resistant to noise interference.