enter search term and/or author name
Introduction to special issue on multimedia security
Mohan S. Kankanhalli
Article No.: 31
Image hatching (or nonphotorealistic line-art) is a technique widely used in the printing or engraving of currency. Diverse styles of brush strokes have previously been adopted for different areas of an image to create aesthetically pleasing...
Reference index-based H.264 video watermarking scheme
Jian Li, Hongmei Liu, Jiwu Huang, Yun Q. Shi
Article No.: 33
Video watermarking has received much attention over the past years as a promising solution to copy protection. Watermark robustness is still a key issue of research, especially when a watermark is embedded in the compressed video domain. In this...
A robust high-capacity affine-transformation-invariant scheme for watermarking 3D geometric models
Xifeng Gao, Caiming Zhang, Yan Huang, Zhigang Deng
Article No.: 34
In this article we propose a novel, robust, and high-capacity watermarking method for 3D meshes with arbitrary connectivities in the spatial domain based on affine invariants. Given a 3D mesh model, a watermark is embedded as affine-invariant...
Audio recordings should be authenticated before they are used as evidence. Although audio watermarking and signature are widely applied for authentication, these two techniques require accessing the original audio before it is published. Passive...
Collusion attack is a cost-efficient attack for digital fingerprinting. In this article, we propose a novel collusion attack strategy, Iterative Optimization Collusion Attack (IOCA), which is based upon the gradient attack and the principle...
Aggregate licenses validation for digital rights violation detection
Amit Sachan, Sabu Emmanuel, Mohan S. Kankanhalli
Article No.: 37
Digital Rights Management (DRM) is the term associated with the set of technologies to prevent illegal multimedia content distribution and consumption. DRM systems generally involve multiple parties such as owner, distributors, and consumers. The...