A Pollution Attack to Public-key Watermarking Schemes
Public-key watermarking schemes are required to possess two desirable properties: allowing everyone to determine whether a watermark exists in an image or not and ensuring high detection probability in case of malicious modification. In this paper we propose an attack which pollutes the watermark em...
Saved in:
Main Authors: | WU, Yongdong, DENG, Robert H. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2012
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1651 https://ink.library.smu.edu.sg/context/sis_research/article/2650/viewcontent/PollutionAttackPublicKeyWatermarking_2012.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
by: WU, Yongdong, et al.
Published: (2003) -
Watermarking of relational databases
by: SONG YAXIAO
Published: (2010) -
Twenty years of digital audio watermarking—a comprehensive review
by: Hua, Guang, et al.
Published: (2016) -
Tailored reversible watermarking schemes for authentication of electronic clinical atlas
by: Bao, F., et al.
Published: (2013) -
A Fragile Watermarking Scheme for Detecting Malicious Modifications of Database Relations
by: GUO, Huiping, et al.
Published: (2006)