Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques
暂无分享,去创建一个
[1] Jana Dittmann,et al. Copyright-Copywrong , 2000, IEEE Multim..
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Mauro Barni,et al. Watermarking of MPEG-4 video objects , 2005, IEEE Transactions on Multimedia.
[4] Jm Jan Smits,et al. Digital Video Broadcasting: Technology, Standards, and Regulations , 2003 .
[5] Alessandro Neri,et al. End-to-end quality of service assessment in mobile applications for user-centric multimedia networks by tracing watermarking , 2005 .
[6] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[7] Benoit M. Macq,et al. A robust soft hash algorithm for digital image signature , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[8] Didier Le Gall,et al. MPEG: a video compression standard for multimedia applications , 1991, CACM.
[9] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[10] Elaine B. Barker. Digital Signature Standard (DSS) [includes Change Notice 1 from 12/30/1996] | NIST , 1994 .
[11] Mark Handley,et al. Forward Error Correction (FEC) Building Block , 2002, RFC.
[12] Oded Goldreich,et al. Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme , 1986, CRYPTO.
[13] Sunil R. Das,et al. An adaptive compressed MPEG-2 video watermarking scheme , 2005, IEEE Transactions on Instrumentation and Measurement.