Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Watermarking attack

Known as: Watermark attack, Watermark exploit, Watermarking exploit 
In cryptography, a watermarking attack is an attack on disk encryption methods where the presence of a specially crafted piece of data can be… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2009
Highly Cited
2009
There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership… Expand
Is this relevant?
Highly Cited
2008
Highly Cited
2008
In a forensic watermarking architecture, a buyer-seller protocol protects the watermark secrets from the buyer and prevents false… Expand
  • figure 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding… Expand
  • figure 1
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
2007
2007
In this paper, we describe some attack strategies we have applied to three different grayscale watermarked images in the… Expand
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Over the past few years a number of research papers about reversible watermarks has been produced. Reversible watermarking is a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
In this paper, a robust watermarking algorithm using balanced multiwavelet transform is proposed. The latter transform achieves… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 6
  • figure 4
Is this relevant?
2004
2004
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2004
Highly Cited
2004
Abstract An innovative watermarking scheme based on genetic algorithms (GA) in the transform domain is proposed. It is robust… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Abstract Digital image watermarking techniques for copyright protection have become increasingly robust. The best algorithms… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Digital image watermarking has become a popular technique for authentication and copyright protection. For verifying the security… Expand
Is this relevant?