2019
DOI: 10.1007/978-3-030-33795-7_5
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and Copyright Protection of Videos Under Transmitting Specifications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 70 publications
0
5
0
Order By: Relevance
“…Due to limited computational resources, it is difficult to develop a system that is invariant to MPEG noise quantization and MPEG compression. However, we can examine a set of frames on the candidates of I-frame that are fully transmitted with respect to B-frames and P-frames (Favorskaya and Buryachenko, 2020b).…”
Section: Motion Analysismentioning
confidence: 99%
“…Due to limited computational resources, it is difficult to develop a system that is invariant to MPEG noise quantization and MPEG compression. However, we can examine a set of frames on the candidates of I-frame that are fully transmitted with respect to B-frames and P-frames (Favorskaya and Buryachenko, 2020b).…”
Section: Motion Analysismentioning
confidence: 99%
“…Recently in 2020, reference [46] studied the selection of relevant regions in I-frames under predefined restrictions and conditions based on transmission specifications. It uses the stable regions to embed the invariant features and the unstable zones of the I-frames to embed a fragile watermark.…”
Section: ) Authentication Challengesmentioning
confidence: 99%
“…Accordingly, references [1,19] have applied SHA256 hash functions on the extracted features from HEVC videos to prevent code imitation for authenticated video. Contrarily, reference [46] has applied the Arnold scrambling transform for authentication purposes which is a reversible technique not strong enough to be used for such application.…”
Section: ) Security Challengesmentioning
confidence: 99%
See 1 more Smart Citation
“…Fourier-processing of finite discrete two-dimensional (FDTD) signals (including images) in informational control (IC) systems is the most important method for studying processes and analyzing information [1][2][3][4][5][6][7][8]. The theoretical basis of Fourierprocessing of FDTD signals is two-dimensional direct and inverse discrete Fourier transforms (2D DFT, 2D IDFT) [9][10][11][12][13][14][15] which can be represented in form of:…”
Section: Introductionmentioning
confidence: 99%