Attacks on SVD-Based watermarking schemes
One major application of a watermarking scheme is to protect the copyright of a content owner by embedding the owner's watermark into the content. Recently, two watermarking schemes were proposed by Chang et al. [1, 2], which are based on singular value decomposition (SVD). In this paper, we pr...
| Main Authors: | Huo-Chong, Ling, Raphael C. -W., Phan, Swee-Huay, Heng |
|---|---|
| Format: | Article |
| Published: |
SPRINGER-VERLAG BERLIN
2008
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2785/ |
Similar Items
Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
by: Ling, Huo-Chong, et al.
Published: (2007)
by: Ling, Huo-Chong, et al.
Published: (2007)
Enhancing Svd-Based Image
Watermarking Strategies Based On
Digital Chaos
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022)
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022)
A fragile watermarking scheme protecting originator's rights for multimedia service
by: Ting, Grace C. -W., et al.
Published: (2007)
by: Ting, Grace C. -W., et al.
Published: (2007)
Attacks on a robust watermarking scheme based on self-reference image
by: TING, G, et al.
Published: (2008)
by: TING, G, et al.
Published: (2008)
3-Move undeniable signature scheme
by: Kurosawa, Kaoru, et al.
Published: (2005)
by: Kurosawa, Kaoru, et al.
Published: (2005)
Off-line keyword guessing attacks on recent Public Key Encryption with Keyword Search Schemes
by: Wei-Chuen, Yau, et al.
Published: (2008)
by: Wei-Chuen, Yau, et al.
Published: (2008)
An efficient certificateless signature scheme
by: Yap, Wun She, et al.
Published: (2006)
by: Yap, Wun She, et al.
Published: (2006)
Flaws in generic watermarking protocols based on zero-knowledge proofs
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On an optimal robust digital image watermarking based on SVD using differential evolution algorithm
by: Ling, Huo-Chong, et al.
Published: (2011)
by: Ling, Huo-Chong, et al.
Published: (2011)
Performance Evaluation Of RDWT-SVD and DWT-SVD Watermarking Schemes
by: Rassem, Taha H., et al.
Published: (2016)
by: Rassem, Taha H., et al.
Published: (2016)
Linkability of some blind signature schemes
by: Heng, Swee-Huay, et al.
Published: (2007)
by: Heng, Swee-Huay, et al.
Published: (2007)
Cryptanalaysia Of SVD & DWT Based Watermarking Schemes
by: Ting, Chai-Wen
Published: (2007)
by: Ting, Chai-Wen
Published: (2007)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Cryptanalysis of some proxy signature schemes without certificates
by: Yap, Wun-She, et al.
Published: (2007)
by: Yap, Wun-She, et al.
Published: (2007)
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)
by: Goi, Bok Min, et al.
Published: (2007)
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
An efficient and provable secure identity-based identification scheme in the standard model
by: Ji-Jian, Chin, et al.
Published: (2008)
by: Ji-Jian, Chin, et al.
Published: (2008)
SVD-BASED SIGNATURE VERIFICATION TECHNIQUE USING DATA GLOVE
by: KAMEL, NIDAL S., et al.
Published: (2008)
by: KAMEL, NIDAL S., et al.
Published: (2008)
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
Robust And Imperceptible Digital Video
Watermarking Techniques
by: al-Taweel, Sadik Ali Murshid
Published: (2011)
by: al-Taweel, Sadik Ali Murshid
Published: (2011)
Robust and imperceptible digital video watermarking techniques.
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Performance evaluation of wavelet SVD-based watermarking schemes for color images
by: Rassem, Taha H., et al.
Published: (2020)
by: Rassem, Taha H., et al.
Published: (2020)
Robust Video Watermarking Based On 3D-DWT Domain.
by: A.M .Al-Taweel, Sadik., et al.
Published: (2009)
by: A.M .Al-Taweel, Sadik., et al.
Published: (2009)
Cryptanalysis of the n-party encrypted Diffie-Hellman key exchange using different passwords
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
by: Phan, Raphael Chung Wei, et al.
Published: (2006)
A fair AQM scheme for aggregated ECN and non-ECN traffic
by: Chong, P
Published: (2004)
by: Chong, P
Published: (2004)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
Security attacks taxonomy on bring your own devices (BYOD) model
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
by: Singh, Manmeet Mahinderjit, et al.
Published: (2014)
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
ICMPv6 Echo Request Ddos Attack Detection Framework Using Backpropagation Neural Network
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
by: Mohammed Ahmed Saad, Redhwan
Published: (2016)
A preliminary study on biometric watermarking for offline handwritten signature
by: Low, C. Y., et al.
Published: (2007)
by: Low, C. Y., et al.
Published: (2007)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
Fusion of LSB and DWT biometric watermarking for offline handwritten signature
by: Cheng-Yaw, Low, et al.
Published: (2008)
by: Cheng-Yaw, Low, et al.
Published: (2008)
Biometric Template Protection Using Watermarking with Hidden Password Encryption
by: Islam, Md. Rajibul, et al.
Published: (2008)
by: Islam, Md. Rajibul, et al.
Published: (2008)
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
by: Phan, Raphael C.-W., et al.
Published: (2008)
by: Phan, Raphael C.-W., et al.
Published: (2008)
Generalized Scheme For Fractal Based Digital Signature (GFDS).
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
by: Alia, Mohammad Ahmad, et al.
Published: (2007)
Security mediated certificateless signatures
by: Yap, Nvun-She, et al.
Published: (2007)
by: Yap, Nvun-She, et al.
Published: (2007)
A prediction-based neural network scheme for lossless data compression
by: Logeswaran, R.
Published: (2002)
by: Logeswaran, R.
Published: (2002)
Similar Items
-
Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001
by: Ling, Huo-Chong, et al.
Published: (2007) -
Enhancing Svd-Based Image
Watermarking Strategies Based On
Digital Chaos
by: Alshoura, Wafa’hamdan Suleiman
Published: (2022) -
A fragile watermarking scheme protecting originator's rights for multimedia service
by: Ting, Grace C. -W., et al.
Published: (2007) -
Attacks on a robust watermarking scheme based on self-reference image
by: TING, G, et al.
Published: (2008) -
3-Move undeniable signature scheme
by: Kurosawa, Kaoru, et al.
Published: (2005)