منابع مشابه
The Watermark Template Attack
This paper presents a new attack, called the watermark template attack, for watermarked images. In contrast to the Stirmark benchmark [1-2], this attack does not severely reduce the quality of the image. This attack maintains, therefore, the commercial value of the watermarked image. In contrast to previous approaches [3-4], it is not the aim of the attack to change the statistics of embedded w...
متن کاملWatermark Detection: Benchmarking Perspectives
Benchmarking of watermarking algorithms is a complicated task that requires examination of a set of mutually dependent performance factors (algorithm complexity, decoding/detection performance, and perceptual quality). This paper will focus on detection/decoding performance evaluation and try to summarize its basic principles. A methodology for deriving the corresponding performance metrics wil...
متن کاملA Neural Watermark Approach
In this paper we propose the coupling of a watermarking technique for images, called least significant bit, in the multiple classes random neural network. For that, we design a training process of the watermark pattern, an embedding process of the learned pattern in the original image, and a detecting process of this pattern in the carrier image. The removal of the watermark is not considered i...
متن کاملThe Watermark Copy Attack
Research in digital watermarking has progressed along two paths. While new watermarking technologies are being developed, some researchers are also investigating di erent ways of attacking digital watermarks. Common attacks to watermarks usually aim to destroy the embedded watermark or to impair its detection. In this paper we propose a conceptually new attack for digitally watermarked images. ...
متن کاملKey Independent Watermark Detection
Many types of pseudo-random signals have been used to embed signatures as watermarks, with spread spectrum signal techniques used to recover the signature from the encrypted data. Legendre sequences are a suitable candidate for signature encryption as they exhibit ‘perfect’ two level auto-correlation. Additionally, Legendre sequences have the unusual and interesting property of invariance under...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Finance and Stochastics
سال: 2016
ISSN: 0949-2984,1432-1122
DOI: 10.1007/s00780-016-0319-x