메뉴 건너뛰기




Volumn 4, Issue 3, 2009, Pages 273-283

On reliability and security of randomized detectors against sensitivity analysis attacks

Author keywords

Chernoff bounds; Detection security; Error exponents; Generalized Gaussian distribution (GGD); Maximum likelihood (ML); Randomization; Security; Sensitivity attacks; Spread spectrum; Watermarking

Indexed keywords

CHERNOFF BOUNDS; DETECTION SECURITY; ERROR EXPONENTS; GENERALIZED GAUSSIAN DISTRIBUTION (GGD); MAXIMUM LIKELIHOOD (ML); RANDOMIZATION; SECURITY; SENSITIVITY ATTACKS; SPREAD SPECTRUM;

EID: 69749094234     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2009.2021783     Document Type: Article
Times cited : (3)

References (18)
  • 2
    • 0007751316 scopus 로고    scopus 로고
    • Analysis of the sensitivity attack against electronic watermarks in images
    • Portland, OR, Apr.
    • J. P. Linnartz and M. van Dijk, "Analysis of the sensitivity attack against electronic watermarks in images," in Proc. Workshop of Information Hiding, Portland, OR, Apr. 1998, pp. 258-272.
    • (1998) Proc. Workshop of Information Hiding , pp. 258-272
    • Linnartz, J.P.1    Van Dijk, M.2
  • 6
    • 21844452953 scopus 로고    scopus 로고
    • A new sensitivity analysis attack
    • San Jose, CA, Jan.
    • M. El Choubassi and P. Moulin, "A new sensitivity analysis attack," in Proc. SPIE Conf., San Jose, CA, Jan. 2005, pp. 734-745.
    • (2005) Proc. SPIE Conf. , pp. 734-745
    • El Choubassi, M.1    Moulin, P.2
  • 7
    • 34249290091 scopus 로고    scopus 로고
    • Noniterative algorithms for sensitivity analysis attacks
    • Jun.
    • M. El Choubassi and P. Moulin, "Noniterative algorithms for sensitivity analysis attacks," IEEE Trans. Inf. Forensics Security, vol.2, no.2, pp. 113-126, Jun. 2007.
    • (2007) IEEE Trans. Inf. Forensics Security , vol.2 , Issue.2 , pp. 113-126
    • El Choubassi, M.1    Moulin, P.2
  • 8
    • 33646763554 scopus 로고    scopus 로고
    • Randomized detection for spread-spectrum watermarking: Defending against sensitivity and other attacks
    • Philadelphia, PA
    • R. Venkatesan and M. H. Jakubowski, "Randomized detection for spread-spectrum watermarking: Defending against sensitivity and other attacks," in Proc. ICASSP, Philadelphia, PA, 2005.
    • (2005) Proc. ICASSP
    • Venkatesan, R.1    Jakubowski, M.H.2
  • 10
    • 33645698671 scopus 로고    scopus 로고
    • On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks
    • M. El Choubassi and P. Moulin, "On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks," Proc. SPIE, pp. 575-586, 2006.
    • (2006) Proc. SPIE , pp. 575-586
    • El Choubassi, M.1    Moulin, P.2
  • 12
    • 28944435491 scopus 로고    scopus 로고
    • Data-hiding codes (tutorial)
    • Dec.
    • P. Moulin and R. Koetter, "Data-hiding codes (tutorial)," Proc. IEEE, vol.93, no.12, pp. 2083-2127, Dec. 2005.
    • (2005) Proc. IEEE , vol.93 , Issue.12 , pp. 2083-2127
    • Moulin, P.1    Koetter, R.2
  • 14
    • 0019894867 scopus 로고
    • Signal detection under mismatch
    • Jul.
    • D. Kazakos, "Signal detection under mismatch," IEEE Trans. Inf. Theory, vol.IT-28, no.4, pp. 681-684, Jul. 1982.
    • (1982) IEEE Trans. Inf. Theory , vol.IT-28 , Issue.4 , pp. 681-684
    • Kazakos, D.1
  • 15
    • 0027681636 scopus 로고
    • Distribution shape of two-dimensional DCT coefficients of natural images
    • Oct.
    • F. Müller, "Distribution shape of two-dimensional DCT coefficients of natural images," Electron. Lett., vol.29, no.22, pp. 1935-1936, Oct. 1993.
    • (1993) Electron. Lett. , vol.29 , Issue.22 , pp. 1935-1936
    • Müller, F.1
  • 16
    • 0033882559 scopus 로고    scopus 로고
    • DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure
    • Jan.
    • J. R. Hernández, M. Amado, and F. Pérez-González, "DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure," IEEE Trans. Signal Process., vol.9, no.1, pp. 55-68, Jan. 2000.
    • (2000) IEEE Trans. Signal Process. , vol.9 , Issue.1 , pp. 55-68
    • Hernández, J.R.1    Amado, M.2    Pérez-González, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.