Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia
B Czaplewski, R Rykaczewski - Signal Processing, 2015 - Elsevier
This paper addresses the problem of unauthorized redistribution of multimedia content by
malicious users (pirates). The solution proposed here is a new joint fingerprinting and …
malicious users (pirates). The solution proposed here is a new joint fingerprinting and …
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
B Czaplewski - Journal of Visual Communication and Image …, 2016 - Elsevier
This paper addresses the problem of unauthorized redistribution of multimedia content by
malicious users (pirates). In this method three color channels of the image are considered a …
malicious users (pirates). In this method three color channels of the image are considered a …
Digital fingerprinting for color images based on the quaternion encryption scheme
In this paper we present a new quaternion-based encryption technique for color images. In
the proposed encryption method, images are written as quaternions and are rotated in a …
the proposed encryption method, images are written as quaternions and are rotated in a …
Role of Walsh Codes and pseudorandom noise sequences in CDMA
Walsh Codes are a set of orthonormal codes while PN Sequences are statistically random
but deterministically formed binary sequences. This paper discusses the basic concepts …
but deterministically formed binary sequences. This paper discusses the basic concepts …
Receiver-side fingerprinting method based on quaternion sandwich product
B Czaplewski, R Rykaczewski - Przegląd Telekomunikacyjny+ …, 2014 - mostwiedzy.pl
In this paper a new receiver-side fingerprinting method for color images is proposed. The
proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) …
proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) …
Immunizing the Hillcast method against the known-plaintext attack using periodic key exchange
B Czaplewski, R Rykaczewski - Przegląd Telekomunikacyjny+ …, 2013 - mostwiedzy.pl
This paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the
copyright protection and traitor tracing in case of Video on Demand services. Because the …
copyright protection and traitor tracing in case of Video on Demand services. Because the …
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
B Czaplewski, R Rykaczewski - Przegląd Telekomunikacyjny+ …, 2015 - mostwiedzy.pl
The proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses
a cipher based on quaternion rotation to encrypt color images that are then sent to all users …
a cipher based on quaternion rotation to encrypt color images that are then sent to all users …
[PDF][PDF] Convolutional/turbo encoding improvements for different multiuser detection algorithms in unperfect reception conditions
The simulation environment used is Matlab and the results for all these detectors will be
illustrated in the last chapter as figures of BER (Bit Error Rate) depending on the SNR …
illustrated in the last chapter as figures of BER (Bit Error Rate) depending on the SNR …
Innovative semi orthogonal revamped Walsh Hadamard (ISORWH) sequence for asynchronous CDMA application
D Chakraborty, MK Tarafder, A Chandra - 2013 - IET
Code Division Multiple Access (CDMA) is the most popular wireless access technology in
modern mobile communication. Design of CDMA spreading codes has grown sufficient …
modern mobile communication. Design of CDMA spreading codes has grown sufficient …
Implementation of different behaviours of DS-CDMA systems with multiuser detectors
In this paper we present a comparative analysis of conventional & MMSE multiuser detectors
performances in CDMA systems. At base station end the main reason that affects …
performances in CDMA systems. At base station end the main reason that affects …