Integrated access control and intrusion detection for web servers

T Ryutov, C Neuman, K Dongho… - IEEE transactions on …, 2003 - ieeexplore.ieee.org
Current intrusion detection systems work in isolation from access control for the application
the systems aim to protect. The lack of coordination and interoperation between these …

Introducing a new method robust against crop attack in digital image watermarking using two-step sudoku

MS Goli, A Naghsh - … on pattern recognition and image analysis …, 2017 - ieeexplore.ieee.org
Several methods are exploited to watermark digital images as a safety measure for storing
information, but an attacker can destroy the information by cropping a segment of the …

New secure QIM-based information hiding algorithms

VA Mitekin, VA Fedoseev - Computer Optics, 2018 - ui.adsabs.harvard.edu
The paper proposes two information hiding algorithms for multimedia based on Quantization
Index Modulation (QIM): IM-QIM and SIM-QIM. They are designed to prevent a statistical …

[PDF][PDF] 抗噪声, 几何失真和JPEG 压缩攻击的鲁棒数字水印方案

许文丽, 李磊[1, 王育民 - 2008 - edit.jeit.ac.cn
该文提出了一个抗噪声, 几何失真和JPEG 压缩攻击的鲁棒数字水印方案, 首先对原始水印信息
进行置乱变换, 然后再进行Turbo 码编码以及扩频, 合成, 产生CDMA 水印信息 …

[PDF][PDF] 量化水印算法分析

许君一, 熊昌镇, 齐东旭, 黄继武 - 通信学报, 2006 - infocomm-journal.com
对量化水印算法稳健性与抗攻击能力问题, 给出了公有水印算法稳健性充分必要条件和抗攻击
能量上限, 弥补了抗攻击能力评估上没有精确界限的缺陷. 分析了载体系数的改变幅度及固定保 …

Anti-cropping digital image watermarking using Sudoku

SKA Khalid, MM Deris… - International Journal of …, 2013 - inderscienceonline.com
Many digital image watermarking schemes have been developed to embed copyright
information into an image. However, an attacker may reuse parts of a watermarked image by …

A new QIM-based watermarking algorithm robust against multi-image histogram attack

V Mitekin, V Fedoseev - Procedia engineering, 2017 - Elsevier
A new attack aimed at DM-QIM watermark was proposed in (Mitekin, 2016). Key recovery
results obtained during proposed attack show that for a set of watermarked images it is …

[HTML][HTML] Алгоритмы встраивания информации на основе QIM, стойкие к статистической атаке

ВА Митекин, ВА Федосеев - Компьютерная оптика, 2018 - cyberleninka.ru
В работе предлагаются два новых алгоритма встраивания информации в
мультимедиа, относящиеся к семейству алгоритмов на основе управляемого …

A new key recovery attack against DM-QIM image watermarking algorithm

V Mitekin - Ninth International Conference on Machine Vision …, 2017 - spiedigitallibrary.org
In this paper a new attack aimed at DM-QIM watermark detection and extraction is proposed,
based on known histogram-based attacks against non-dithered QIM algorithm. Key recovery …

Multiple-watermarking scheme of the European Article Number Barcode using similar code division multiple access technique

WY Chen - Applied mathematics and computation, 2008 - Elsevier
The code division multiple access technique is widely used in digital communication
systems. In this paper, a mix codec, hamming codec, and spread spectrum technique …