Secure Video Multicast Based on Desynchronized Fingerprint and Partial Encryption
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
Quasi-commutative watermarking and encryption for secure media content distribution
Multimedia Tools and Applications
Joint watermarking and encryption of color images in the Fibonacci-Haar domain
EURASIP Journal on Advances in Signal Processing
A secure solution for ubiquitous multimedia broadcasting
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Secure and traceable multimedia distribution for convergent Mobile TV services
Computer Communications
Content and Service Protection for the Ubiquitous TV Based on Network Convergence
Wireless Personal Communications: An International Journal
Service and P2P based secure media sharing in mobile commerce environments
Electronic Commerce Research
Multimedia Tools and Applications
Traceable content protection based on chaos and neural networks
Applied Soft Computing
On the hybrid multi-watermarking
Signal Processing
Computer Methods and Programs in Biomedicine
Content distribution and copyright authentication based on combined indexing and watermarking
Multimedia Tools and Applications
Journal of Real-Time Image Processing
On multiwatermarking in cloud environment
Concurrency and Computation: Practice & Experience
Partial encryption and watermarking scheme for audio files with controlled degradation of quality
Multimedia Tools and Applications
Reversible data hiding in encrypted images using pseudorandom sequence modulation
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Joint watermarking and encryption for still visual data
Multimedia Tools and Applications
Hi-index | 0.00 |
A scheme is proposed to implement commutative video encryption and watermarking during advanced video coding process. In H.264/AVC compression, the intra-prediction mode, motion vector difference and discrete cosine transform (DCT) coefficients' signs are encrypted, while DCT coefficients' amplitudes are watermarked adaptively. To avoid that the watermarking operation affects the decryption operation, a traditional watermarking algorithm is modified. The encryption and watermarking operations are commutative. Thus, the watermark can be extracted from the encrypted videos, and the encrypted videos can be re-watermarked. This scheme embeds the watermark without exposing video content's confidentiality, and provides a solution for signal processing in encrypted domain. Additionally, it increases the operation efficiency, since the encrypted video can be watermarked without decryption. These properties make the scheme a good choice for secure media transmission or distribution