30 research outputs found

    Influence of pH on foaming and rheological properties of aerated high sugar system with egg white protein and hydroxypropylmethylcellulose

    Get PDF
    The objective of this study was to evaluate the effects of the total biopolymer (egg white protein - EW and hydroxypropylmethylcellulose – HPMC) concentration (1.4–5.6 g/100 g of sugar) and EW/HPMC ratio (2/1 to 18/1 g/g) on the apparent viscosity before whipping, foaming capacity (density and overrun) and foam rheological properties (G’, G” and ή) of sugar/EW/HPMC mixtures using a central composite rotatable design (CCRD). The conditions to obtain intermediate apparent viscosity, high foaming capacity, elastic and solid behaviour were total biopolymer concentration 5.0 g/100 g of sugar and EW/HPMC ratio 14/1 (g/g). Under these conditions, experiments were carried out to evaluate the effect of interactions between EW and HPMC at pH 3.0, 4.5 and 6.0 on the foaming and rheological properties. The greatest foaming capacity, elastic and solid behaviour, with no liquid drainage, were obtained at pH 3.0. At pH 4.5, foams possessed monodisperse bubble size distribution and viscoelastic behaviour, leading to better stability with respect to disproportionation and coalescence compared to foams at pH 3.0. At pH 6.0, foam showed the poorest foaming properties and viscous behaviour. The interactions between EW and HPMC in aerated confectionery at different pH affect foaming and rheological properties

    Robust audio hashing for audio authentication watermarking

    No full text
    Current systems and protocols based on cryptographic methods for integrity and authenticity verification of media data do not distinguish between legitimate signal transformation and malicious tampering that manipulates the content. Furthermore, they usually provide no localization or assessment of the relevance of such manipulations with respect to human perception or semantics. We present an algorithm for a robust message authentication code in the context of content fragile authentication watermarking to verify the integrity of audio recodings by means of robust audio fingerprinting. Experimental results show that the proposed algorithm provides both a high level of distinction between perceptually different audio data and a high robustness against signal transformations that do not change the perceived information. Furthermore, it is well suited for the integration in a content-based authentication watermarking system

    Robust message authentication code algorithm for digital audio recordings

    No full text
    Paper Abstract Current systems and protocols for integrity and authenticity verification of media data do not distinguish between legitimate signal transformation and malicious tampering that manipulates the content. Furthermore, they usually provide no localization or assessment of the relevance of such manipulations with respect to human perception or semantics. We present an algorithm for a robust message authentication code (RMAC) to verify the integrity of audio recodings by means of robust audio fingerprinting and robust perceptual hashing. Experimental results show that the proposed algorithm provides both a high level of distinction between perceptually different audio data and a high robustness against signal transformations that do not change the perceived information

    Watermark embedding using audio fingerprinting

    No full text
    Digital watermarking is a common technique in multimedia security for copyright protection and data authentication. Embedding a digital watermark into a media file is often computationally demanding as multiple operations take place within the process to ensure a high level of perceived quality of the marked copy and a high robustness of the embedded watermark. State of the art watermarking algorithms require time consuming spectral transformation operations as well as windowing and perceptual models for masking the embedded watermark. Our new concept is to set up a collection of pre-computed watermarking signals and mix them with the cover signal for fast and simple embedding. To ensure that the watermark signal is well suited for the embedding position with respect to masking, we suggest using audio fingerprinting technology as matching mechanism. Test results show that our approach in able to watermark content using such proposed lookup collection

    Audio watermarking and partial encryption

    No full text
    Today two technologies are applied when protecting audio data in digital rights management (DRM) environments: Encryption and digital watermarking. Encryption renders the data unreadable for those not in the possession of a key enabling decryption. This is especially of interest for access control, as usage of the audio data is restricted to those owning a key. Digital watermarking adds additional information into an audio file without influencing quality our file size. This additional information can be used for inserting copyright information or a customer identity into the audio file. The later method is of special interest for DRM as it is the only protection mechanism enabling tracing illegal usage to a certain customer even after the audio data has escaped the secure DRM environment. Existing methods combine these methods in first embedding the watermark and than encrypting the content. As a more efficient alternative, we introduce a combined watermarking and encr yption scheme where both mechanisms are transparent to each other. A watermark is embedded in and detected from an encrypted or unencrypted file. The watermark also does not influence the encryption mechanism. The only requirement for this method is a common key available to both algorithms

    Regional products and traditional and organic food: coexistence or competition?

    No full text

    Video game watermarking

    No full text
    The publishers of video games suffer from illegal piracy and information leakage caused by end-consumers, "release groups"or insiders shortly after or even before the official release of a new video game. Mechanisms to prevent or at least postpone this illegal redistribution are DRM or copy protection mechanisms. However, these mechanisms are very unpopular, because they restrict the customers in playing the game and demand a high administration effort from the developers and/or distributors. Even worse, most copy protection mechanisms have proven to be insecure as "patches" for circumvention usually are available quickly and easy to get. To satisfy the challenges of security and usability, this work introduces the idea of using digital watermarking to protect all available and suitable media types and software binaries contained in a video game. A three-layered watermarking deployment approach along the production chain is proposed to detect leakage in the release phas e as well as during the development process of a boxed video game. The proposed approach features both copyright watermarking and collusion secure fingerprints embedded as transaction watermark messages in components of video games. We discuss the corresponding new challenges and opportunities. In addition, a prototype watermarking algorithm is presented to demonstrate the adaption necessity of classical image watermarking when applied to video games to satisfies the requirements for transparency, security as well as performance.The watermark capacity is significantly increased while inter-media and inter-file embedding is enabled and the associated synchronization challenge is solved by robust hashes
    corecore