2005 5th International Conference on Information Communications &Amp; Signal Processing
DOI: 10.1109/icics.2005.1689175
|View full text |Cite
|
Sign up to set email alerts
|

Audio Encryption Using Fragile Watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…The watermarks can also be used to scramble the audio content. [10] This method provides lightweight encryption combined with watermarking.…”
Section: Protection Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…The watermarks can also be used to scramble the audio content. [10] This method provides lightweight encryption combined with watermarking.…”
Section: Protection Techniquesmentioning
confidence: 99%
“…The first method utilizes hash chains [11] and the second embeds the counter value in the watermark [10].…”
Section: Protection Techniquesmentioning
confidence: 99%
“…• "Watermarking Followed by Encryption" (WFE) [8,9,17] where the issuer generates and embeds the recipient fingerprint within a copy before encrypting it. Herein, the seller is considered as honest.…”
Section: Introduction: Teleassistance Legal Framework and Medical Litmentioning
confidence: 99%
“…Nowadays, different protocols [8][9][10][11][12][13][14][15][16][17][18][19] combine them in order to benefit from the complementarity of these two mechanisms in terms of a priori/a posteriori protection, and consequently to provide a better security response. Most of them focus on the copyright protection in the framework of video on demand (VOD), where the objective is to identify the person (issuer or recipient) at the origin of an illegal distribution by mean of a watermark (a fingerprint).…”
Section: Introduction: Teleassistance Legal Framework and Medical Litmentioning
confidence: 99%
“…confidentiality, integrity …). Today, different protocols [5][6][7][8] combine them in order to provide a better security response.…”
Section: Introductionmentioning
confidence: 99%