Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Collusion Attack

Handbook of Research on Secure Multimedia Distribution
The operations that combine several media copies together to produce a new copy. The operations include averaging, replacement, linear combination, etc. They are often used to break a video fingerprinting technology.
Published in Chapter:
A Survey on Video Watermarking
Shiguo Lian (France Telecom R&D (Orange Labs) Beijing, China)
Copyright: © 2009 |Pages: 21
DOI: 10.4018/978-1-60566-262-6.ch025
Abstract
Video watermarking technique embeds some information into videos by modifying video content slightly. The embedded information, named watermark, may be ownership information, customer information, integrity information, redundancy information, and so forth. Thus, this technique can be used for copyright protection, piracy tracing, content authentication, advertisement surveillance, error resilience, and so forth. In this chapter, we give an overview on video watermarking technology, including its architecture, performance requirement, typical algorithms, hot topics, and open issues.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Traitor Tracing in Mobile Multimedia Communication
The operation that combines different multimedia copies together to generate a new copy in order to remove the information contained in the copies. This operation can be done by one customer or between different customers.
Full Text Chapter Download: US $37.50 Add to Cart
Secure Routing with Reputation in MANET
If a number of adversary nodes make a coalition against reputation of other nodes.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR