Sciweavers

30 search results - page 2 / 6
» Graph Theoretic Software Watermarks: Implementation, Analysi...
Sort
View
SMI
2010
IEEE
218views Image Analysis» more  SMI 2010»
14 years 9 months ago
A Benchmark for 3D Mesh Watermarking
This paper presents a benchmarking system for the evaluation of robust mesh watermarking methods. The proposed benchmark has three different components: a "standard" mesh...
Kai Wang, Guillaume Lavoué, Florence Denis,...
TIFS
2008
152views more  TIFS 2008»
14 years 11 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 5 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
16 years 4 days ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
OSDI
2006
ACM
15 years 12 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris