Sciweavers

123 search results - page 18 / 25
» New attacks on SARI image authentication system
Sort
View
IWDW
2007
Springer
15 years 5 months ago
Dither Modulation in the Logarithmic Domain
Abstract. Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they desynchronize the decoder, completely ru...
Pedro Comesaña, Fernando Pérez-Gonz&...
ICIP
2007
IEEE
16 years 22 days ago
On a Watermarking Scheme in the Logarithmic Domain and its Perceptual Advantages
Scaling attacks are well-known to be some of the most harmful strategies against quantization-based watermarking methods, as they can completely ruin the performance of the waterm...
Pedro Comesaña, Fernando Pérez-Gonz&...
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 2 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
ESOP
2010
Springer
15 years 2 months ago
A Semantic Framework for Declassification and Endorsement
Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Se...
Aslan Askarov, Andrew Myers
WISA
2004
Springer
15 years 4 months ago
Encrypted Watermarks and Linux Laptop Security
The most common way to implement full-disk encryption (as opposed to encrypted file systems) in the GNU/Linux operating system is using the encrypted loop device, known as CryptoL...
Markku-Juhani Olavi Saarinen