Integrated access control and intrusion detection for web servers
Current intrusion detection systems work in isolation from access control for the application
the systems aim to protect. The lack of coordination and interoperation between these …
the systems aim to protect. The lack of coordination and interoperation between these …
Introducing a new method robust against crop attack in digital image watermarking using two-step sudoku
MS Goli, A Naghsh - … on pattern recognition and image analysis …, 2017 - ieeexplore.ieee.org
Several methods are exploited to watermark digital images as a safety measure for storing
information, but an attacker can destroy the information by cropping a segment of the …
information, but an attacker can destroy the information by cropping a segment of the …
New secure QIM-based information hiding algorithms
VA Mitekin, VA Fedoseev - Computer Optics, 2018 - ui.adsabs.harvard.edu
The paper proposes two information hiding algorithms for multimedia based on Quantization
Index Modulation (QIM): IM-QIM and SIM-QIM. They are designed to prevent a statistical …
Index Modulation (QIM): IM-QIM and SIM-QIM. They are designed to prevent a statistical …
[PDF][PDF] 抗噪声, 几何失真和JPEG 压缩攻击的鲁棒数字水印方案
许文丽, 李磊[1, 王育民 - 2008 - edit.jeit.ac.cn
该文提出了一个抗噪声, 几何失真和JPEG 压缩攻击的鲁棒数字水印方案, 首先对原始水印信息
进行置乱变换, 然后再进行Turbo 码编码以及扩频, 合成, 产生CDMA 水印信息 …
进行置乱变换, 然后再进行Turbo 码编码以及扩频, 合成, 产生CDMA 水印信息 …
Anti-cropping digital image watermarking using Sudoku
SKA Khalid, MM Deris… - International Journal of …, 2013 - inderscienceonline.com
Many digital image watermarking schemes have been developed to embed copyright
information into an image. However, an attacker may reuse parts of a watermarked image by …
information into an image. However, an attacker may reuse parts of a watermarked image by …
A new QIM-based watermarking algorithm robust against multi-image histogram attack
V Mitekin, V Fedoseev - Procedia engineering, 2017 - Elsevier
A new attack aimed at DM-QIM watermark was proposed in (Mitekin, 2016). Key recovery
results obtained during proposed attack show that for a set of watermarked images it is …
results obtained during proposed attack show that for a set of watermarked images it is …
[HTML][HTML] Алгоритмы встраивания информации на основе QIM, стойкие к статистической атаке
ВА Митекин, ВА Федосеев - Компьютерная оптика, 2018 - cyberleninka.ru
В работе предлагаются два новых алгоритма встраивания информации в
мультимедиа, относящиеся к семейству алгоритмов на основе управляемого …
мультимедиа, относящиеся к семейству алгоритмов на основе управляемого …
A new key recovery attack against DM-QIM image watermarking algorithm
V Mitekin - Ninth International Conference on Machine Vision …, 2017 - spiedigitallibrary.org
In this paper a new attack aimed at DM-QIM watermark detection and extraction is proposed,
based on known histogram-based attacks against non-dithered QIM algorithm. Key recovery …
based on known histogram-based attacks against non-dithered QIM algorithm. Key recovery …
Multiple-watermarking scheme of the European Article Number Barcode using similar code division multiple access technique
WY Chen - Applied mathematics and computation, 2008 - Elsevier
The code division multiple access technique is widely used in digital communication
systems. In this paper, a mix codec, hamming codec, and spread spectrum technique …
systems. In this paper, a mix codec, hamming codec, and spread spectrum technique …