Sciweavers

1143 search results - page 14 / 229
» Extraction in software watermarking
Sort
View
ICIP
2006
IEEE
14 years 1 months ago
Public Key Watermarking for Reversible Image Authentication
In this paper, we propose a new public key watermarking scheme for reversible image authentication where if the image is authentic, the distortion due to embedding can be complete...
Sang-Kwang Lee, Young-Ho Suh, Yo-Sung Ho
MMSEC
2004
ACM
126views Multimedia» more  MMSEC 2004»
14 years 29 days ago
Key-dependency for a wavelet-based blind watermarking algorithm
When a host image is watermarked multiple times by the same algorithm collisions can occur. This makes it difficult for an image to host multiple watermarks. But this hosting is n...
Michael Brachtl, Andreas Uhl, Werner Dietl
SMI
2010
IEEE
218views Image Analysis» more  SMI 2010»
13 years 5 months ago
A Benchmark for 3D Mesh Watermarking
This paper presents a benchmarking system for the evaluation of robust mesh watermarking methods. The proposed benchmark has three different components: a "standard" mesh...
Kai Wang, Guillaume Lavoué, Florence Denis,...
MATA
2004
Springer
149views Communications» more  MATA 2004»
14 years 27 days ago
Detecting and Proving Manipulation Attacks in Mobile Agent Systems
Mobile agents are software entities consisting of code, data and state that can migrate autonomously from host to host executing their code. Unfortunately, security issues restrict...
Oscar Esparza, Miguel Soriano, Jose L. Muño...
IH
2005
Springer
14 years 1 months ago
Self-validating Branch-Based Software Watermarking
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques are software watermarking, ...
Ginger Myles, Hongxia Jin