Multimedia Computing, Communications, and Applications (TOMM)


Search Issue
enter search term and/or author name


ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM) - Special Issue on Multimedia Security, Volume 8 Issue 2S, September 2012

Introduction to special issue on multimedia security
Mohan S. Kankanhalli
Article No.: 31
DOI: 10.1145/2344436.2344437

Image hatching for visual cryptography
Jonathan Weir, Weiqi Yan, Mohan S. Kankanhalli
Article No.: 32
DOI: 10.1145/2344436.2344438

Image hatching (or nonphotorealistic line-art) is a technique widely used in the printing or engraving of currency. Diverse styles of brush strokes have previously been adopted for different areas of an image to create aesthetically pleasing...

Reference index-based H.264 video watermarking scheme
Jian Li, Hongmei Liu, Jiwu Huang, Yun Q. Shi
Article No.: 33
DOI: 10.1145/2344436.2344439

Video watermarking has received much attention over the past years as a promising solution to copy protection. Watermark robustness is still a key issue of research, especially when a watermark is embedded in the compressed video domain. In this...

A robust high-capacity affine-transformation-invariant scheme for watermarking 3D geometric models
Xifeng Gao, Caiming Zhang, Yan Huang, Zhigang Deng
Article No.: 34
DOI: 10.1145/2344436.2344440

In this article we propose a novel, robust, and high-capacity watermarking method for 3D meshes with arbitrary connectivities in the spatial domain based on affine invariants. Given a 3D mesh model, a watermark is embedded as affine-invariant...

Exposing MP3 audio forgeries using frame offsets
Rui Yang, Zhenhua Qu, Jiwu Huang
Article No.: 35
DOI: 10.1145/2344436.2344441

Audio recordings should be authenticated before they are used as evidence. Although audio watermarking and signature are widely applied for authentication, these two techniques require accessing the original audio before it is published. Passive...

A collusion attack optimization strategy for digital fingerprinting
Hui Feng, Hefei Ling, Fuhao Zou, Weiqi Yan, Zhengding Lu
Article No.: 36
DOI: 10.1145/2344436.2344442

Collusion attack is a cost-efficient attack for digital fingerprinting. In this article, we propose a novel collusion attack strategy, Iterative Optimization Collusion Attack (IOCA), which is based upon the gradient attack and the principle...

Aggregate licenses validation for digital rights violation detection
Amit Sachan, Sabu Emmanuel, Mohan S. Kankanhalli
Article No.: 37
DOI: 10.1145/2344436.2344443

Digital Rights Management (DRM) is the term associated with the set of technologies to prevent illegal multimedia content distribution and consumption. DRM systems generally involve multiple parties such as owner, distributors, and consumers. The...