Sciweavers

31 search results - page 4 / 7
» Watermarking Attack: Security of WSS Techniques
Sort
View
MEDIAFORENSICS
2010
13 years 8 months ago
Better security levels for broken arrows
This paper considers the security aspect of the robust zero-bit watermarking technique `Broken Arrows'(BA),1 which was invented and tested for the international challenge BOW...
Fuchun Xie, Teddy Furon, Caroline Fontaine
ICMCS
2005
IEEE
95views Multimedia» more  ICMCS 2005»
14 years 21 days ago
On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks
A common way of resisting protocol attacks is to employ cryptographic techniques so that provable security can be retained. However, some desired requirements of watermarking such...
Chun-Shien Lu, Chia-Mu Yu
ICMCS
2006
IEEE
187views Multimedia» more  ICMCS 2006»
14 years 1 months ago
A Nonnegative Matrix Factorization Scheme for Digital Image Watermarking
We present a new scheme for digital watermarking and secure copyright protection of digital images using nonnegative matrix factorization and singular value decomposition approach...
Mohammadreza Ghaderpanah, A. Ben Hamza
IWDW
2005
Springer
14 years 18 days ago
Security of DM Quantization Watermarking Schemes: A Practical Study for Digital Images
Abstract. In this paper, the security of Dither Modulation Quantization Index Modulation schemes for digital images is analyzed. Both pixel and DCT coefficient quantization schemes...
Patrick Bas, Jarmo Hurri
IH
2001
Springer
13 years 11 months ago
Robust Covert Communication over a Public Audio Channel Using Spread Spectrum
We present a set of watermarking techniques for effective covert communication over an audio signal carrier. Watermark robustness is enabled using: (i) redundant spread-spectrum fo...
Darko Kirovski, Henrique S. Malvar