The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Developing multimedia embedded applications continues to flourish. In fact, a biometric facial recognition system can be used not only on PCs abut also in embedded systems, it is a potential enhancer to meet security and surveillance needs. The analysis of facial recognition consists offoursteps: face analysis, face expressions’ recognition, missing data completion and full face recognition. This...
In multimedia distribution platforms, one of the main challenges is to provide an efficient and accurate tracing process despite the lack of information about the colluders' strategy. Indeed, the original Tardos tracing performance is considered as suboptimal because of its agnostic behavior and conservative accusation regardless the collusion strategy. The Expectation Maximization algorithm has shown...
The multimedia traitor tracing field involves the embedding of a collusion secure fingerprint in the host signal to retrieve and prevent any multimedia content fraud. Trendy work aims at providing a tracing system which offers a good protection of the digital content and an efficient tracing process. These challenges depend on reducing the length of the embedded fingerprint and the complexity of the...
This paper presents a novel approach in tracing traitors field. It proposes a multi-level hierarchical structure to the used probabilistic fingerprinting code; the well known Tardos code. This proposed structure is performed to address the problem of computational costs and time of Tardos code during its accusation step. The generated fingerprint is embedded in the extracted audio stream of the media...
According to the ever development of multimedia distribution systems, more than one technique was proposed in the literature to address the copyright protection issue. One key technique was to propose a fingerprinting system based on traitor tracing process to retrieve back the traitorous users who can operate in the mid-way. Some previous works agree upon the fact that users belonging to the same...
Handling a great number of users and surviving different types of attacks present fundamental challenges of the majority fingerprinting systems in the tracing traitor field. In this paper, the proposed technique consists in embedding a fingerprint, a QR code in the audio stream extracted from the media release. Using the QR-code provides several advantages as supporting a large amount of information...
The encroachment of Internet and Peer to Peer networks has really facilitated our daily lives and works but it contributes to another dangerous phenomenon which is copying a digital content without having authorization, called piracy. To handle this phenomenon, several techniques of tracing traitors were proposed, by combining in the same time a fingerprinting technique to a watermarking one. In this...
One of the most important issues of the digital watermarking is the watermark's robustness. That's why the error correcting codes (ECC) techniques were proposed. In this article, the performance of ECC in audio watermarking system is researched. The conclusion is that BCH encoders and turbo codes are the most important encoders. They have the best experimental robustness results against several audio...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.