Copy attack

The copy attack is an attack on certain digital watermarking systems proposed by M. Kutter, S. Voloshynovskiy, and A. Herrige in a paper presented in… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2000-2017
02420002017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Sensor photoresponse nonuniformity has been proposed as a unique identifier (fingerprint) for various forensic tasks, including… (More)
  • figure 1
  • table I
  • figure 2
  • table III
  • table II
Is this relevant?
2011
2011
Multimedia forensics deals with the analysis of multimedia data to gather information on their origin and authenticity through… (More)
  • figure I
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
2010
2010
Algorithm which could resist copy attack effectively is rare, especially for video watermarking. In order to resist copy attack… (More)
  • figure 5
  • figure 1
  • figure 7
Is this relevant?
2009
2009
  • Kuang Hang
  • 2009 International Conference on Digital Image…
  • 2009
Combined with one-way Hash function, the parity of block DCT coefficients and JPEG quantization technology, etc, this paper… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
Is this relevant?
2005
2005
As an attacking approach to digital watermark, copy attack has reduced the utility of watermark and posed a threat to copyright… (More)
  • figure I
Is this relevant?
2004
2004
The paper considers especially attacks that can disclose or counterfeit hidden information. We first explore copy and collage… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2003
2003
Digital watermarking appears today as an e.cient mean of securing multimedia documents. Several application scenarios in the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2002
2002
Three major aspects in the protection of digital documents have been pointed out, each of them with different requirements: first… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Digital image watermarking techniques for copyright protection have become increasingly robust. The best algorithms performwell… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Research in digital watermarking has progressed along two paths. While new watermarking technologies are being developed, some… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?