11 |
Digital video watermarking techniques for secure multimedia creation and delivery.January 2004 (has links)
Chan Pik-Wah. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2004. / Includes bibliographical references (leaves 111-130). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Background --- p.1 / Chapter 1.2 --- Research Objective --- p.3 / Chapter 1.3 --- Contributions --- p.4 / Chapter 1.4 --- The Structure of this Thesis --- p.6 / Chapter 2 --- Literature Review --- p.7 / Chapter 2.1 --- Security in Multimedia Communications --- p.8 / Chapter 2.2 --- Cryptography --- p.11 / Chapter 2.3 --- Digital Watermarking --- p.14 / Chapter 2.4 --- Essential Ingredients for Video Watermarking --- p.16 / Chapter 2.4.1 --- Fidelity --- p.16 / Chapter 2.4.2 --- Robustness --- p.17 / Chapter 2.4.3 --- Use of Keys --- p.19 / Chapter 2.4.4 --- Blind Detection --- p.20 / Chapter 2.4.5 --- Capacity and Speed --- p.20 / Chapter 2.4.6 --- Statistical Imperceptibility --- p.21 / Chapter 2.4.7 --- Low Error Probability --- p.21 / Chapter 2.4.8 --- Real-time Detector Complexity --- p.21 / Chapter 2.5 --- Review on Video Watermarking Techniques --- p.22 / Chapter 2.5.1 --- Video Watermarking --- p.25 / Chapter 2.5.2 --- Spatial Domain Watermarks --- p.26 / Chapter 2.5.3 --- Frequency Domain Watermarks --- p.30 / Chapter 2.5.4 --- Watermarks Based on MPEG Coding Struc- tures --- p.35 / Chapter 2.6 --- Comparison between Different Watermarking Schemes --- p.38 / Chapter 3 --- Novel Watermarking Schemes --- p.42 / Chapter 3.1 --- A Scene-based Video Watermarking Scheme --- p.42 / Chapter 3.1.1 --- Watermark Preprocess --- p.44 / Chapter 3.1.2 --- Video Preprocess --- p.46 / Chapter 3.1.3 --- Watermark Embedding --- p.48 / Chapter 3.1.4 --- Watermark Detection --- p.50 / Chapter 3.2 --- Theoretical Analysis --- p.52 / Chapter 3.2.1 --- Performance --- p.52 / Chapter 3.2.2 --- Capacity --- p.56 / Chapter 3.3 --- A Hybrid Watermarking Scheme --- p.60 / Chapter 3.3.1 --- Visual-audio Hybrid Watermarking --- p.61 / Chapter 3.3.2 --- Hybrid Approach with Different Water- marking Schemes --- p.69 / Chapter 3.4 --- A Genetic Algorithm-based Video Watermarking Scheme --- p.73 / Chapter 3.4.1 --- Watermarking Scheme --- p.75 / Chapter 3.4.2 --- Problem Modelling --- p.76 / Chapter 3.4.3 --- Chromosome Encoding --- p.79 / Chapter 3.4.4 --- Genetic Operators --- p.80 / Chapter 4 --- Experimental Results --- p.85 / Chapter 4.1 --- Test on Robustness --- p.85 / Chapter 4.1.1 --- Experiment with Frame Dropping --- p.87 / Chapter 4.1.2 --- Experiment with Frame Averaging and Sta- tistical Analysis --- p.89 / Chapter 4.1.3 --- Experiment with Lossy Compression --- p.90 / Chapter 4.1.4 --- Test of Robustness with StirMark 4.0 --- p.92 / Chapter 4.1.5 --- Overall Comparison --- p.98 / Chapter 4.2 --- Test on Fidelity --- p.100 / Chapter 4.2.1 --- Parameter(s) Setting --- p.101 / Chapter 4.2.2 --- Evaluate with PSNR --- p.101 / Chapter 4.2.3 --- Evaluate with MAD --- p.102 / Chapter 4.3 --- Other Features of the Scheme --- p.105 / Chapter 4.4 --- Conclusion --- p.106 / Chapter 5 --- Conclusion --- p.108 / Bibliography --- p.110
|
12 |
Completely Anonymous Buyer-Seller Watermarking ProtocolsChen, Ming-Te 25 July 2005 (has links)
Digital watermarking is one of the most popular technologies for protecting the ownerships of digital contents or products. By embedding digital watermarks into digital contents, the owners of the contents can convince the judge or the trusted third party of their ownership of the contents. However, some attacks, such as the binding attacks and the men-in-the-middle attacks, are threatening the security of the watermarking mechanisms. Moreover, that the privacy of content buyers is not fully protected or the dispute between the buyers and the sellers cannot be fairly resolved also reduce the quality of the services. Although several buyer-seller watermarking protocols have been introduced in the literature, none can cope with all of the above problems. In this thesis, we will propose a novel buyer-seller watermarking protocol that can resolve the dispute between the buyers and the sellers fairly. Furthermore, not only is the proposed protocol immune to all of the known attacks, but it is truly buyer anonymous as well.
|
13 |
Refinements in a DCT based non-uniform embedding watermarking scheme /Giakoumakis, Michail D. January 2003 (has links) (PDF)
Thesis (M.S. in Applied Math and M.S. in Systems Engineering)--Naval Postgraduate School, March 2003. / Thesis advisor(s): Roberto Cristi, Ron Pieper, Craig Rasmussen. Includes bibliographical references (p. 119-121). Also available online.
|
14 |
Establishing the digital chain of evidence in biometric systemsBartlow, Nick. January 1900 (has links)
Thesis (Ph. D.)--West Virginia University, 2009. / Title from document title page. Document formatted into pages; contains xiv, 195 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 181-195).
|
15 |
Contextual biometric watermarking of fingerprint imagesTungala, Nikhil C. January 2004 (has links)
Thesis (M.S.)--West Virginia University, 2004. / Title from document title page. Document formatted into pages; contains viii, 69 p. : ill. Includes abstract. Includes bibliographical references (p. 62-69).
|
16 |
Hardware & software codesign of a JPEG200 watermarking encoderMendoza, Jose Antonio. Kougianos, Elias, January 2008 (has links)
Thesis (M.S.)--University of North Texas, Dec., 2008. / Title from title page display. Includes bibliographical references.
|
17 |
Region aware DCT domain invisible robust blind watermarking for color imagesNaraharisetti, Sahasan. Mohanty, Saraju, January 2008 (has links)
Thesis (M.S.)--University of North Texas, Dec., 2008. / Title from title page display. Includes bibliographical references.
|
18 |
Using the discrete wavelet transform to Haar'd code a blind digital watermarkBrannock, Evelyn. January 2009 (has links)
Thesis (Ph. D.)--Georgia State University, 2009. / Title from title page (Digital Archive@GSU, viewed July 20, 2010) Michael Weeks, committee chair; Saeid Belkasim, Robert Harrison, Ephraim McLean, committee members. Includes bibliographical references (p. 145-153).
|
19 |
Digital video watermarking using singular value decomposition and two-dimensional principal component analysisKaufman, Jason R. January 2006 (has links)
Thesis (M.S.)--Ohio University, March, 2006. / Title from PDF t.p. Includes bibliographical references (p. 47-48)
|
20 |
A Multi-Agent Architecture for Information Leakage Detection in Distributed SystemsBishop, Stephen 01 December 2009 (has links)
Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Many current operating systems, such as SELinux, rely on generating labels based on a file's security classification and system-wide security policies and then binding these labels to all such files in the filesystem. Enforcement of security policies in such systems occurs at the time of access to a file or resource. Such mechanisms are flawed, however, in that they do not adequately protect against information laundering by means of covert channels. One recent development, Colored Linux, serves as an extension to SELinux and utilizes watermarking algorithms to "color" the contents of files with their respective security classification in order to enhance resistance to information laundering attacks. In this thesis, a mobile agent-based approach to implementing Colored Linux is proposed to automate the process of detecting and coloring receptive hosts' filesystems and to provide monitoring of the colored filesystem for instances of potential information leakage. Implementation details and execution results are included to illustrate the merits of the proposed approach. An evaluation of the performance of this agent-based system is conducted over a single host as well as a local network of machines and detailed here as well. Finally, third-party analysis of the agent system using formal methods is discussed.
|
Page generated in 0.0908 seconds