Sciweavers

337 search results - page 42 / 68
» Statistical Disclosure Attacks
Sort
View
ICIP
2006
IEEE
14 years 10 months ago
Scalable Multimedia Fingerprinting Forensics with Side Information
Digital fingerprinting uniquely labels each distributed copy with user's ID and provides a proactive means to track the distribution of multimedia. Multi-user collusion is a ...
Wan-Yi Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 2 months ago
A Very Compact "Perfectly Masked" S-Box for AES
Implementations of the Advanced Encryption Standard (AES), including hardware applications with limited resources (e.g., smart cards), may be vulnerable to ā€œside-channel attacksā...
D. Canright, Lejla Batina
IWDW
2005
Springer
14 years 1 months ago
Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images
Abstract. In this paper, the security of Dither Modulation Quantization Index Modulation schemes for digital images is analyzed. Both pixel and DCT coeļ¬ƒcient quantization schemes...
Patrick Bas, Jarmo Hurri
ICASSP
2008
IEEE
14 years 2 months ago
On the tradeoff between security and Robustness of the Trellis Coded Quantization scheme
The steganographic security in the Cachinā€™s work is deļ¬ned as the statistical invisibility between the host signal and its marked version. At contrary, the robustness to an at...
Sofiane Braci, Rémy Boyer, Claude Delpha
CHES
2005
Springer
170views Cryptology» more  CHES 2005»
14 years 1 months ago
Design of Testable Random Bit Generators
Abstract. In this paper, the evaluation of random bit generators for security applications is discussed and the concept of stateless generator is introduced. It is shown how, for t...
Marco Bucci, Raimondo Luzzi