CHAPTER 17 – Video Security and Protection
暂无分享,去创建一个
[1] Hyungjin Kim,et al. Secure Arithmetic Coding , 2007, IEEE Transactions on Signal Processing.
[2] J. Apostolopoulos,et al. Rate-Distortion-Authentication Optimized Streaming of Authenticated Video , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[3] Min Wu,et al. Joint coding and embedding techniques for MultimediaFingerprinting , 2006, IEEE Transactions on Information Forensics and Security.
[4] Min Wu,et al. Collusion-Resistant Video Fingerprinting for Large User Group , 2006, IEEE Transactions on Information Forensics and Security.
[5] Enrico Magli,et al. Multimedia Selective Encryption by Means of Randomized Arithmetic Coding , 2006, IEEE Transactions on Multimedia.
[6] Qi Tian,et al. A Secure and Robust Authentication Scheme for Video Transcoding , 2006, IEEE Transactions on Circuits and Systems for Video Technology.
[7] Lawrence Wai-Choong Wong,et al. Rate-Distortion Optimized Streaming of Authenticated Video , 2006, 2006 International Conference on Image Processing.
[8] Min Wu,et al. A joint signal processing and cryptographic approach to multimedia encryption , 2006, IEEE Transactions on Image Processing.
[9] Philip A. Chou,et al. Rate-distortion optimized streaming of packetized media , 2006, IEEE Transactions on Multimedia.
[10] K. J. Ray Liu,et al. Multimedia Fingerprinting Forensics for Traitor Tracing , 2005 .
[11] C.-C. Jay Kuo,et al. Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.
[12] Rick S. Blum,et al. Multi-sensor image fusion and its applications , 2005 .
[13] Lawrence Wai-Choong Wong,et al. A proposal of butterfly-graph based stream authentication over lossy networks , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[14] Gary J. Sullivan,et al. Video Compression - From Concepts to the H.264/AVC Standard , 2005, Proceedings of the IEEE.
[15] Min Wu,et al. Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.
[16] Min Wu,et al. Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting , 2005, IEEE Transactions on Image Processing.
[17] Deepa Kundur,et al. Statistical invisibility for collusion-resistant digital video watermarking , 2005, IEEE Transactions on Multimedia.
[18] John G. Apostolopoulos,et al. Secure transcoding with JPSEC confidentiality and authentication , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[19] Vinod M. Prabhakaran,et al. On compressing encrypted data , 2004, IEEE Transactions on Signal Processing.
[20] Douglas C. Sicker,et al. Selective encryption for consumer applications , 2004, First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004..
[21] Hakan Hacigümüs,et al. Efficient Execution of Aggregation Queries over Encrypted Relational Databases , 2004, DASFAA.
[22] Zhou Wang,et al. Video quality assessment based on structural distortion measurement , 2004, Signal Process. Image Commun..
[23] Min Wu,et al. Data hiding in image and video .II. Designs and applications , 2003, IEEE Trans. Image Process..
[24] Nasir D. Memon,et al. Automated reassembly of fragmented images , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[25] Hui Cheng,et al. Robust content-dependent high-fidelity watermark for tracking in digital cinema , 2003, IS&T/SPIE Electronic Imaging.
[26] Yuzhuo Zhong,et al. Efficient and fully scalable encryption for MPEG-4 FGS , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..
[27] Min Wu,et al. Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..
[28] A. Bovik,et al. A universal image quality index , 2002, IEEE Signal Processing Letters.
[29] Wenjun Zeng,et al. A format-compliant configurable encryption framework for access control of video , 2002, IEEE Trans. Circuits Syst. Video Technol..
[30] Min Wu,et al. Collusion-resistant fingerprinting for multimedia , 2002, IEEE Signal Processing Magazine.
[31] Reihaneh Safavi-Naini,et al. Collusion Secure q-ary Fingerprinting for Perceptual Content , 2001, Digital Rights Management Workshop.
[32] John G. Apostolopoulos,et al. Secure scalable streaming enabling transcoding without decryption , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).
[33] C.-C. Jay Kuo,et al. Efficient multimedia encryption via entropy codec design , 2001, IS&T/SPIE Electronic Imaging.
[34] Ingemar J. Cox,et al. Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..
[35] Jessica Staddon,et al. Combinatorial properties of frameproof and traceability codes , 2001, IEEE Trans. Inf. Theory.
[36] Mihaela van der Schaar,et al. The MPEG-4 fine-grained scalable video coding method for multimedia streaming over IP , 2001, IEEE Trans. Multim..
[37] Weiping Li,et al. Overview of fine granularity scalability in MPEG-4 video standard , 2001, IEEE Trans. Circuits Syst. Video Technol..
[38] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[39] Min Wu,et al. Dynamic resource allocation via video content and short-term traffic statistics , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).
[40] Aggelos K. Katsaggelos,et al. Error resilient video coding techniques , 2000, IEEE Signal Process. Mag..
[41] J. O’Sullivan,et al. Information-theoretic analysis of information hiding , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[42] G. Wornell,et al. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding , 2000, 2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060).
[43] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[44] Wenjun Zeng,et al. Efficient frequency domain video scrambling for content access control , 1999, MULTIMEDIA '99.
[45] Joe Kilian,et al. A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.
[46] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[47] Robert E. Tarjan,et al. Resistance of digital watermarks to collusive attacks , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).
[48] Klara Nahrstedt,et al. Comparison of MPEG encryption algorithms , 1998, Comput. Graph..
[49] Ahmed H. Tewfik,et al. Multiresolution scene-based video watermarking using perceptual models , 1998, IEEE J. Sel. Areas Commun..
[50] Wenjun Zeng,et al. Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..
[51] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[52] Mihir Bellare,et al. A concrete security treatment of symmetric encryption , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[53] Mihir Bellare,et al. Practice-Oriented Provable-Security , 1997, ISW.
[54] Lei Tang,et al. Methods for encrypting and decrypting MPEG video data efficiently , 1997, MULTIMEDIA '96.
[55] David Hutchinson,et al. Continuous media filters for heterogeneous internetworking , 1996, Electronic Imaging.
[56] Jack C. Lee,et al. Toward on-line, worldwide access to Vatican Library materials , 1996, IBM J. Res. Dev..
[57] Boon-Lock Yeo,et al. Rapid scene analysis on compressed video , 1995, IEEE Trans. Circuits Syst. Video Technol..
[58] Jerome M. Shapiro,et al. Embedded image coding using zerotrees of wavelet coefficients , 1993, IEEE Trans. Signal Process..
[59] Yao Wang,et al. Maximally smooth image recovery in transform coding , 1993, IEEE Trans. Commun..
[60] David J. Field,et al. Contour integration by the human visual system: Evidence for a local “association field” , 1993, Vision Research.
[61] R. Cox,et al. The analog voice privacy system , 1987, ICASSP '86. IEEE International Conference on Acoustics, Speech, and Signal Processing.
[62] A.V. Oppenheim,et al. The importance of phase in signals , 1980, Proceedings of the IEEE.
[63] Shih-Fu Chang,et al. Quality-Optimized and Secure End-to-End Authentication for Media Delivery , 2008, Proceedings of the IEEE.
[64] Min Wu,et al. PERFORMANCE STUDY OF ECC-BASED COLLUSION-RESISTANT MULTIMEDIA FINGERPRINTING , 2004 .
[65] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.