Sciweavers

78 search results - page 3 / 16
» Attacking Some Perceptual Image Hash Algorithms
Sort
View
ICIP
2002
IEEE
14 years 7 months ago
Waterfilling: a connection between information theoretic and perceptually based watermarking
We present a hybrid approach to image watermarking that exploits results from both information theory and perceptual studies. Towards this purpose we use a waterfilling-type algor...
Siva Somasundaram, Rajarathnam Chandramouli
IWDW
2007
Springer
13 years 11 months ago
Dither Modulation in the Logarithmic Domain
Abstract. Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they desynchronize the decoder, completely ru...
Pedro Comesaña, Fernando Pérez-Gonz&...
ICMCS
2005
IEEE
95views Multimedia» more  ICMCS 2005»
13 years 11 months ago
On The Security of Mesh-Based Media Hash-Dependent Watermarking Against Protocol Attacks
A common way of resisting protocol attacks is to employ cryptographic techniques so that provable security can be retained. However, some desired requirements of watermarking such...
Chun-Shien Lu, Chia-Mu Yu
JCST
2007
97views more  JCST 2007»
13 years 5 months ago
Improved Collision Attack on Hash Function MD5
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. The algorithm is based on the two-block collision differential path of MD5 that ...
Jie Liang, Xue-Jia Lai
KES
2005
Springer
13 years 11 months ago
Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack
Abstract. Invertibility attack is a hostile measure to breach watermarking systems. In this paper, a novel watermarking protocol using a one-way hash function and a check of random...
Xinpeng Zhang, Shuozhong Wang