Sciweavers

MMSEC
2004
ACM
121views Multimedia» more  MMSEC 2004»
14 years 5 months ago
Counteracting Oracle attacks
In the paper, we address oracle attacks for integrity watermarking in a communication setting. We show how an integrity verification algorithm can be modified in order to counte...
Ilaria Venturini
MMSEC
2004
ACM
95views Multimedia» more  MMSEC 2004»
14 years 5 months ago
An improved attack analysis on a public-key spread spectrum watermarking
We analyze the fingerprinting method in [1] and suggest attacks that are better than the ones presented therein. To do this, we observe and use some extra information available i...
Mustafa Kesal, Mehmet Kivanç Mihçak,...
MMSEC
2004
ACM
205views Multimedia» more  MMSEC 2004»
14 years 5 months ago
Wavelet-based blind watermarking of 3D models
Watermarking of 3D meshes has received a limited attention due to the difficulties encountered in extending the algorithms developed for 1D (audio) and 2D (images and video) signa...
F. Uccheddu, Massimiliano Corsini, Mauro Barni