Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,857,575 papers from all fields of science
Search
Sign In
Create Free Account
Oracle attack
Known as:
Compression oracle
, Compression oracle attack
In the field of security engineering, an oracle attack is an attack that exploits the availability of a weakness in the system which can be used as…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
CRIME
Concrete security
Cryptanalysis
Data compression
Expand
Broader (1)
Security engineering
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
RobotChain: Artificial Intelligence on a Blockchain using Tezos Technology
Vasco Lopes
2019
Corpus ID: 215874308
Blockchain technology is not only growing everyday at a fast-passed rhythm, but it is also a disruptive technology that has…
Expand
2017
2017
Blockchain Oracles – Einsatz der Blockchain-Technologie für Offline-Anwendungen
A. Hoppe
2017
Corpus ID: 196146018
2017
2017
An oracle-based attack on CAPTCHAs protected against oracle attacks
Carlos Javier Hernández-Castro
,
M. Rodríguez-Moreno
,
David F. Barrero
,
Shujun Li
arXiv.org
2017
Corpus ID: 14270671
CAPTCHAs/HIPs are security mechanisms that try to prevent automatic abuse of services. They are susceptible to learning attacks…
Expand
2015
2015
A NEW SCHEME FOR IMAGE AUTHENTICATION FRAMEWORK
R. Baušys
,
A. Kriukovas
2015
Corpus ID: 16058831
The paper proposes a digital signature-based approach for image authentication, pixel-wise tamper localization and iterative…
Expand
2015
2015
On the effectiveness of meta-detection for countering oracle attacks in watermarking
B. Tondi
,
Pedro Comesaña Alfaro
,
F. Pérez-González
,
M. Barni
International Workshop on Information Forensics…
2015
Corpus ID: 18105663
We evaluate the performance of smart metadetection as a way to combat oracle attacks in watermarking. In a recent work, we have…
Expand
2010
2010
Structuring Protocol Implementations to Protect Sensitive Data
Petr Marchenko
,
B. Karp
USENIX Security Symposium
2010
Corpus ID: 12458877
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security…
Expand
2009
2009
Privacy Protection in On-line Shopping for Electronic Documents
Yu-Chi Chen
,
G. Horng
,
Chang-Chin Huang
Fifth International Conference on Information…
2009
Corpus ID: 14512083
2008
2008
Blind Synthesis Attack on SVD Based Watermarking Techniques
Rowayda A. Sadek
International Conference on Computational…
2008
Corpus ID: 8927498
Singular value decomposition (SVD) is robust and reliable orthogonal matrix decomposition. Due to its conceptual and stability…
Expand
2004
2004
Counteracting Oracle attacks
I. Venturini
Workshop on Multimedia & Security
2004
Corpus ID: 15992738
In the paper, we address oracle attacks for integrity watermarking in a communication setting. We show how an integrity…
Expand
2004
2004
New attacks on SARI image authentication system
J. Wu
,
Bin B. Zhu
,
Shipeng Li
,
Fuzong Lin
IS&T/SPIE Electronic Imaging
2004
Corpus ID: 18559855
The image authentication system SARI proposed by Lin and Chang passes JPEG compression and rejects other malicious manipulations…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE