Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In this paper, the compressed sensing (CS) methodology is applied to the harmonic part of sinusoidally-modeled audio signals. As this part of the model is sparse by definition in the frequency domain, we investigate how CS can be used to encode this signal at low bitrates, instead of encoding the sinusoidal parameters (amplitude, frequency, phase) as current state-of-the-art methods do. We extend...
This paper investigates the possibility of extracting latent aspects of a video, using visual information about humans (e.g. actors' faces), in order to develop a fingerprinting (replica detection) framework. We employ a generative probabilistic model, namely Latent Dirichlet Allocation (LDA), so as to capture latent aspects of a video, using facial semantic information derived from the video. We...
This paper presents a novel stream-level joint layered coding scheme for unified reliable and secure media transmission over wireless networks. The proposed scheme simultaneously protects both compressed media content and the authentication data from wireless channel impairments. Therefore, the media quality degradation incurred by both channel noise and authentication constraints can be minimized...
In this paper, we study the collision property of one of the robust hash functions proposed. This method was originally proposed for robust hash generation from blocks of image data and is based on projection of image block data on pseudo-random matrices. We show that collision performance of this robust hash function is not optimal when used to extract hash bits from a moment invariants feature matrix...
In this paper, we propose a joint digital watermarking protocol for the multiparty multilevel DRM architecture using Garner's algorithm for the Chinese remainder theorem (CRT). Our protocol exploits the incremental nature of the computation of CRT by the Garner's algorithm. The proposed joint watermarking protocol embeds a single watermark signal into the content while taking care of the various security...
Embedding efficiency, which is defined as the average number of secret data bits embedded per one embedding change, is an important attribute directly influencing the security of steganography. Higher embedding efficiency is usually expected to get more secure steganographic method. In this paper, by incorporating two previously introduced techniques: the ldquosum and difference covering setrdquo...
A DCT domain image encryption scheme based on chaotic shuffling table is proposed, in which the shuffling tables are generated by several logistic maps. This scheme is robust to normal image processing, such as noising, smoothing, compressing, and even print-scan processing. In this scheme, key space is easy to be adjusted by choosing the number of logistic maps. The encrypted image is still highly...
This paper presents a novel method for the protection of copyrighted multimedia content. The problem of selective encryption (SE) has been addressed along with compression for the state of the art video codec H.264/AVC. SE is performed in the context-based adaptive binary arithmetic coding (CABAC) module of video codec. For this purpose, CABAC is converted to an encryption cipher by scrambling of...
In this paper, we consider the problem of incorporating privacy protection in a biometric access control system. An anonymous biometric access control (ABAC) system is proposed to verify the membership status of a user using biometric signals without knowing his or her true identity. This system is useful in protecting the privacy of authorized users while keeping out potential imposters and attackers...
Content based image retrieval (CBIR) is a technique to search for images relevant to the user's query from an image collection. In last decade, most attention has been paid to improve the retrieval performance. However, there is no significant effort to investigate the security concerning in CBIR. Under the query by example (QBE) paradigm, the user supplies an image as a query and the system returns...
In this paper we focus on improving the optimized content-aware authentication scheme over lossy network and incorporating this scheme into secure scalable streaming (SSS) and secure transcoding with JPEG-2000 images. SSS encodes, encrypts and packetizes image into secure scalable packets in a manner that allows downstream transcoders to perform transcoding operations by simply truncating or discarding...
Group video-conferencing systems are routinely used in major corporations, hospitals and universities for meetings, tele-medicine and distance learning among participants from very distant locations. As the use of video-conferencing becomes widely prevalent, the privacy concern's raised by this technology becomes an important issue to be addressed. In this paper we propose a real-time privacy preserving...
In this paper we investigate the applicability of different parts of the JPEG2000 codestream for authentication. Apart from the packet body different classes of information contained in the packet header are investigated. We report on experimental results obtained with a large test set of natural images to assess how discriminative and how sensitive each class of information is. Specific attacks against...
In this paper, we present a DCT domain watermarking approach for H.264/AVC video coding standard. This scheme is resilient to compressed-domain temporal adaptation. A cryptographic hash function is used to generate a semi-fragile watermark to provide content-based authentication. The embedded watermark can withstand frame-dropping due to temporal adaptation, yet it is able to detect malicious attacks...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.