Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Copy attack

The copy attack is an attack on certain digital watermarking systems proposed by M. Kutter, S. Voloshynovskiy, and A. Herrige in a paper presented in… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
In recent years video watermarking has become an important research issue due to increase in threats of video piracy, content… Expand
  • figure 1
  • figure 2
  • table II
  • figure 3
  • table III
Highly Cited
2011
Highly Cited
2011
Sensor photoresponse nonuniformity has been proposed as a unique identifier (fingerprint) for various forensic tasks, including… Expand
  • figure 1
  • table I
  • figure 2
  • table III
  • table II
2011
2011
Sensor photoresponse nonuniformity has been proposed as a unique identifier (fingerprint) for various forensic tasks, including… Expand
2009
2009
  • P. Cika
  • 16th International Conference on Systems, Signals…
  • 2009
  • Corpus ID: 14854675
The interest in the digital image watermarking rises rapidly each year. This paper describes the influence of error correction… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
2006
2006
Multimedia security is an incredibly significant area of concern. A number of papers on robust digital watermarking have been… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • table III
2004
2004
The paper considers especially attacks that can disclose or counterfeit hidden information. We first explore copy and collage… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2003
Highly Cited
2003
Digital watermarking appears today as an efficient mean of securing multimedia documents. Several application scenarios in the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
2002
2002
Three major aspects in the protection of digital documents have been pointed out, each of them with different requirements: first… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Highly Cited
2001
Highly Cited
2001
Abstract Digital image watermarking techniques for copyright protection have become increasingly robust. The best algorithms… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2000
Highly Cited
2000
Research in digital watermarking has progressed along two paths. While new watermarking technologies are being developed, some… Expand