CDN Performance Evaluation with Edge-Embedded Watermarking
Abstract
References
Index Terms
- CDN Performance Evaluation with Edge-Embedded Watermarking
Recommendations
High Performance and Energy Efficient Image Watermarking for Video Using a Mobile Device
This article describes the basic information hiding technique that is most commonly used nowadays. As evolution in the communication media has made information access much easier but has also increased the risks of invading privacy and ownership. To ...
Image watermarking using psychovisual threshold over the edge
ICT-EurAsia'13: Proceedings of the 2013 international conference on Information and Communication TechnologyCurrently the digital multimedia data can easily be copied. Digital image watermarking is an alternative approach to authentication and copyright protection of digital image content. An alternative embedding watermark based on human eye properties can ...
DWT and TSVQ-based Semi-fragile Watermarking Scheme for Tampering Detection in Remote Sensing Images
PSIVT '10: Proceedings of the 2010 Fourth Pacific-Rim Symposium on Image and Video TechnologyA semi fragile watermarking scheme for remote sensing images is presented. The suggested scheme uses the signature of the multispectral or hyper spectral image to embed the mark and detects a forgery of the marked image, e.g. a tampered region. The ...
Comments
Information & Contributors
Information
Published In
- Chair:
- Ali C. Begen,
- General Chairs:
- Tamar Shoham,
- Alex Giladi,
- Program Co-chairs:
- Christian Timmerer,
- Dan Grois
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Short-paper
Conference
Upcoming Conference
- Sponsor:
- sigmm
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 28Total Downloads
- Downloads (Last 12 months)10
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in