Sciweavers

30 search results - page 2 / 6
» Graph Theoretic Software Watermarks: Implementation, Analysi...
Sort
View
SMI
2010
IEEE
218views Image Analysis» more  SMI 2010»
14 years 7 months ago
A Benchmark for 3D Mesh Watermarking
This paper presents a benchmarking system for the evaluation of robust mesh watermarking methods. The proposed benchmark has three different components: a "standard" mesh...
Kai Wang, Guillaume Lavoué, Florence Denis,...
TIFS
2008
152views more  TIFS 2008»
14 years 9 months ago
Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works to a more general scenario. The se...
Luis Pérez-Freire, Fernando Pérez-Go...
MMSEC
2006
ACM
132views Multimedia» more  MMSEC 2006»
15 years 3 months ago
On achievable security levels for lattice data hiding in the known message attack scenario
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret...
Luis Pérez-Freire, Fernando Pérez-Go...
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
15 years 10 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
OSDI
2006
ACM
15 years 9 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris