Conditional access systems. |
Requirements.
History and state of the art.
Design of a conditional access system. |
Data hiding and watermarking. |
Basic concepts.
Watermarking versus data hiding.
Spread-spectrum watermarking.
Quantization-based watermarking.
Application to images and video.
Application to copyright protection of deep learning models. |
Signal Processing in the Encrypted Domain. |
Privacy metrics and notions.
Homomorphic encryption.
Garbled cicruits.
Signal representation and cipher blowup.
Applications. |