The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper conducted a preliminary study and exploration of dynamic watermarking scheme. Firstly, the paper introduces software watermarking technology and analyses the process of dynamic graph watermarking. Secondly, this paper proposes and realizes the IPPCT dynamic watermarking scheme based on Chinese remainder theorem, and details the stages of watermarking embedding, decomposition, encryption...
H.264 video coding standard supports a broad range of application and providing its security is an important research topic. In this work, a video encryption algorithm for H.264 is proposed, which combines permutation code algorithm with dynamic keys. This work aims at providing more security for H.264 video using dynamic keys and permutation code algorithm, for confidential video transmission with...
We put forward a new method for using dynamic keys to encrypt video information on the theory and characteristics of the H.264 video compression standard. The dynamic key encrypts the most important parts of video information, not only to ensure the safety of the information but also to improve the transmission rate. The algorithm is implemented in JM12.4, experimental results show that the new algorithm...
This paper is aimed at the image encryption scheme applicable to JPEG2000 codec. Firstly, two chaotic maps are suggested and their statistic characteristics are also analyzed. Secondly, to accomplish a controllable visual effect of encrypted image, a visual quality control model is presented, and on the basis of which, a chaotic image encryption scheme is constructed by chaotically modulating the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.