Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,258,725 papers from all fields of science
Search
Sign In
Create Free Account
Watermarking attack
Known as:
Watermark attack
, Watermark exploit
, Watermarking exploit
Expand
In cryptography, a watermarking attack is an attack on disk encryption methods where the presence of a specially crafted piece of data can be…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
10 relations
BestCrypt
Block cipher mode of operation
Comparison of disk encryption software
Cryptoloop
Expand
Broader (1)
Disk encryption
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm
Vipul Sharma
,
R. N. Mir
Journal of King Saud University: Computer and…
2019
Corpus ID: 108377348
Highly Cited
2012
Highly Cited
2012
A robust region-adaptive dual image watermarking technique
Chunlin Song
,
S. Sudirman
,
M. Merabti
Journal of Visual Communication and Image…
2012
Corpus ID: 1955355
Review
2012
Review
2012
Watermark Attacks AndApplications in Watermarking
Harish Kumar
2012
Corpus ID: 62079658
digital watermarking of multimedia content has become a very active research area over the last several years. Digital…
Expand
Highly Cited
2011
Highly Cited
2011
Lexicographical framework for image hashing with implementation based on DCT and NMF
Zhenjun Tang
,
Shuozhong Wang
,
Xinpeng Zhang
,
Weimin Wei
,
Yan Zhao
Multimedia tools and applications
2011
Corpus ID: 6591084
Image hash is a content-based compact representation of an image for applications such as image copy detection, digital…
Expand
Highly Cited
2009
Highly Cited
2009
A secure digital camera architecture for integrated real-time digital rights management
S. Mohanty
Journal of systems architecture
2009
Corpus ID: 2084878
Highly Cited
2008
Highly Cited
2008
Information Hiding and Multimedia Signal Processing
Jeng-Shyang Pan
,
Ajith Abraham
Journal of Digital Information Management
2008
Corpus ID: 18611926
Accessing various multimedia contents is something very essential in our daily life. However, delivery of multimedia contents…
Expand
2007
2007
Genetic algorithm audio watermarking using multiple image-based watermarks
M. Ketcham
,
S. Vongpraphip
International Symposium on Communications and…
2007
Corpus ID: 41972361
This article presents the audio watermarking using multiple image-based watermarks based on genetic algorithms (GA) in the…
Expand
2007
2007
Watermarking attack: BOWS contest
J. Bennour
,
J. Dugelay
,
F. Matta
Electronic imaging
2007
Corpus ID: 1184633
In this paper, we describe some attack strategies we have applied to three different grayscale watermarked images in the…
Expand
2004
2004
Watermarking Attack: Security of WSS Techniques
François Cayre
,
C. Fontaine
,
T. Furon
International Workshop on Digital Watermarking
2004
Corpus ID: 7326682
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a…
Expand
Review
2004
Review
2004
ALGORITHMS FOR AUDIO WATERMARKING AND STEGANOGRAPHY
N. Cvejic
2004
Corpus ID: 17095617
Broadband communication networks and multimedia data available in a digital format opened many challenges and opportunities for…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE