Elements of information theory
Elements of information theory
Digital watermarking
Similarity estimation techniques from rounding algorithms
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
Information-theoretic analysis of watermarking
ICASSP '00 Proceedings of the Acoustics, Speech, and Signal Processing, 2000. on IEEE International Conference - Volume 06
Information-theoretic analysis of information hiding
IEEE Transactions on Information Theory
Digital watermarking security considerations
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Semi-automatic registration of videos for improved watermark detection
MMSys '10 Proceedings of the first annual ACM SIGMM conference on Multimedia systems
A cryptographic method for secure watermark detection
IH'06 Proceedings of the 8th international conference on Information hiding
Transactions on data hiding and multimedia security III
Oracle attacks and covert channels
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Hi-index | 0.00 |
In the paper, we address oracle attacks for integrity watermarking in a communication setting. We show how an integrity verification algorithm can be modified in order to counteract an oracle attack. As an alternative to set up suitable communication protocols, we propose to counteract oracle attacks modifying integrity verification algorithms by adding a suitable temporal constraint.