An overview of attacks against digital watermarking and their respective countermeasures
The increased and widespread usage of digital multimedia has aroused great concerns regarding issues such as copyright protection, copy control and proof of ownership. Digital watermarking serves as a solution to these kinds of problems; however, digital watermarking techniques have demonstrated to...
| Main Authors: | Tanha, Maryam, Torshizi, Seyed Dawood Sajjadi, Abdullah @ Selimun, Mohd Taufik, Hashim, Fazirulhisyam |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2012
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/31692/ http://psasir.upm.edu.my/id/eprint/31692/1/31692.pdf |
Similar Items
New secure and low-cost design for defense in depth implementation using open source software
by: Torshizi, Seyed Dawood Sajjadi, et al.
Published: (2011)
by: Torshizi, Seyed Dawood Sajjadi, et al.
Published: (2011)
An adaptive rate allocation system to mitigate fairness issues in Wi-Fi mesh networks
by: Torshizi, Seyed Dawood Sajjadi
Published: (2013)
by: Torshizi, Seyed Dawood Sajjadi
Published: (2013)
State-of-the-art digital watermarking attacks
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Digital watermarking : an overview
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
State-of-the-art digital watermarking attacks
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
An overview of digital speech watermarking
by: Nematollahi, Mohammad Ali, et al.
Published: (2013)
by: Nematollahi, Mohammad Ali, et al.
Published: (2013)
A robust digital image watermarking using repetition codes
against common attacks
by: Hassan, Abdullahi Mohamud
Published: (2015)
by: Hassan, Abdullahi Mohamud
Published: (2015)
MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2020)
A survey of sybil attack countermeasures in underwater sensor and acoustic networks
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2023)
by: Ahmad Zukarnain, Zuriati, et al.
Published: (2023)
Digital speech watermarking for anti-spoofing attack in speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2014)
by: Nematollahi, Mohammad Ali, et al.
Published: (2014)
Robustness of frequency domain image watermarking against image processing attacks
by: Chai, Jee Sing
Published: (2008)
by: Chai, Jee Sing
Published: (2008)
A dual-watermarking with QR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks
by: Arshad, Akashah, et al.
Published: (2021)
by: Arshad, Akashah, et al.
Published: (2021)
Performance of image watermarking algorithm using RSA with Fibonacci transform against attacks
by: Mahad, Zahari, et al.
Published: (2023)
by: Mahad, Zahari, et al.
Published: (2023)
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
Elastic fair rate allocation scheme for multi-radio wireless mesh networks
by: Torshizi, Seyed Dawood Sajjadi, et al.
Published: (2013)
by: Torshizi, Seyed Dawood Sajjadi, et al.
Published: (2013)
An attack proof intelligent digital watermarking based on safe region of fast fourier transform
by: Olanrewaju, Rashidah Funke, et al.
Published: (2010)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2010)
A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
by: Diallo , Abdoulaye Kindy, et al.
Published: (2013)
Digital Watermarking for Recovering Attack Areas of Medical Images using Spiral Numbering
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
Towards a secure and available smart grid using intrusion tolerance.
by: Tanha, Maryam, et al.
Published: (2012)
by: Tanha, Maryam, et al.
Published: (2012)
An intrusion tolerant system for improving availability in smart grid control centers.
by: Tanha, Maryam, et al.
Published: (2012)
by: Tanha, Maryam, et al.
Published: (2012)
Evaluation approach for efficient countermeasure techniques against denial-of-service attack on MPSoC-based IoT using multi-criteria decision-making
by: Al-Hchaimi, Ahmed Abbas Jasim, et al.
Published: (2022)
by: Al-Hchaimi, Ahmed Abbas Jasim, et al.
Published: (2022)
Robust blind watermarking technique against geometric attacks for fingerprint image using DTCWT-DCT
by: Lebcir, Mohamed, et al.
Published: (2020)
by: Lebcir, Mohamed, et al.
Published: (2020)
A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem
by: Mandangan, Arif, et al.
Published: (2024)
by: Mandangan, Arif, et al.
Published: (2024)
Security and privacy issues in medical internet of things: Overview, countermeasures, challenges and future directions
by: Elhoseny, M., et al.
Published: (2021)
by: Elhoseny, M., et al.
Published: (2021)
Image orientation based watermarking technique in copyright protection
by: Jasim, Hend Muslim, et al.
Published: (2017)
by: Jasim, Hend Muslim, et al.
Published: (2017)
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015)
by: Said, Mohamed Abdisalan
Published: (2015)
Privacy-respecting digital investigation
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013)
by: Badshah, Gran, et al.
Published: (2013)
XML Digital Watermarking
by: Khalid, Edris, et al.
Published: (2013)
by: Khalid, Edris, et al.
Published: (2013)
Digital Watermarking For Images
by: Aileen Koay, Yee Hoon
Published: (2006)
by: Aileen Koay, Yee Hoon
Published: (2006)
A Quick Glance at Digital Watermarking in Medical Images Technique Classification, Requirements, Attacks and Application of Tamper Localization
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
A review on type of attacks on fingerprint image and watermarking techniques
by: Lebcir, Mohamed, et al.
Published: (2019)
by: Lebcir, Mohamed, et al.
Published: (2019)
Countermeasure for Mould Growths in Operation Theatre
by: Teoh, Yan Heng, et al.
Published: (2015)
by: Teoh, Yan Heng, et al.
Published: (2015)
Tyre Cavity Coupling Resonance and Countermeasures
by: Zamri, Mohamed, et al.
Published: (2012)
by: Zamri, Mohamed, et al.
Published: (2012)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
Importance of Watermark Lossless Compression in Digital Medical Image Watermarking
by: Gran, Badshah, et al.
Published: (2015)
by: Gran, Badshah, et al.
Published: (2015)
Quantitative measures of respect and social inclusion in children: overview and recommendations
by: Tredoux , Colin G., et al.
Published: (2009)
by: Tredoux , Colin G., et al.
Published: (2009)
Similar Items
-
New secure and low-cost design for defense in depth implementation using open source software
by: Torshizi, Seyed Dawood Sajjadi, et al.
Published: (2011) -
An adaptive rate allocation system to mitigate fairness issues in Wi-Fi mesh networks
by: Torshizi, Seyed Dawood Sajjadi
Published: (2013) -
State-of-the-art digital watermarking attacks
by: Khalifa, Othman Omran, et al.
Published: (2012) -
Digital watermarking : an overview
by: Khalifa, Othman Omran, et al.
Published: (2011) -
State-of-the-art digital watermarking attacks
by: Khalifa, Othman Omran, et al.
Published: (2011)