On-line/off-line digital signatures
CRYPTO '89 Proceedings on Advances in cryptology
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Enhanced Certificate Revocation System
Enhanced Certificate Revocation System
Secrecy, authentication, and public key systems.
Secrecy, authentication, and public key systems.
Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking
ICMCS '99 Proceedings of the 1999 IEEE International Conference on Multimedia Computing and Systems - Volume 02
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution
ICDAR '03 Proceedings of the Seventh International Conference on Document Analysis and Recognition - Volume 2
An improvement to a biometric.based multimedia content protection scheme
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Watermarking-based digital audio data authentication
EURASIP Journal on Applied Signal Processing
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Security-relevant challenges of selected systems for multi-user interaction
AMR'09 Proceedings of the 7th international conference on Adaptive multimedia retrieval: understanding media and adapting to the user
Database-centric chain-of-custody in biometric forensic systems
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
Reliable provenance information for multimedia data using invertible fragile watermarks
BNCOD'11 Proceedings of the 28th British national conference on Advances in databases
New VoIP traffic security scheme with digital watermarking
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Digital Image Authentication: A Review
International Journal of Digital Library Systems
Hi-index | 0.00 |
Because of multimedia's structure and complexity, security mechanisms for multimedia data should be specific for each purpose. We introduce the most important security requirements for all types of multimedia systems. We also survey revocation methods for digital certificates and introduce a media-independent classification scheme.