An effective asymmetric watermarking procedure has been recently devised in literature, named Transformed-key Asymmetric Watermarking (TKAW). A weakness point of this system is its vulnerability against projection attacks, as well shown by Chen and Ye. This work discusses a modified version of the TKAW to provide robustness against projection attacks, by means of a non-linear transformation, without increasing the computational complexity of the original method but with the same performances

Benedetto, F., Giunta, G. (2012). Security Improvement of a Transformed-Key Asymmetric Watermarking System. SIGNAL PROCESSING RESEARCH, 1(1), 1-6.

Security Improvement of a Transformed-Key Asymmetric Watermarking System

BENEDETTO, FRANCESCO;GIUNTA, GAETANO
2012-01-01

Abstract

An effective asymmetric watermarking procedure has been recently devised in literature, named Transformed-key Asymmetric Watermarking (TKAW). A weakness point of this system is its vulnerability against projection attacks, as well shown by Chen and Ye. This work discusses a modified version of the TKAW to provide robustness against projection attacks, by means of a non-linear transformation, without increasing the computational complexity of the original method but with the same performances
2012
Benedetto, F., Giunta, G. (2012). Security Improvement of a Transformed-Key Asymmetric Watermarking System. SIGNAL PROCESSING RESEARCH, 1(1), 1-6.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11590/134761
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus ND
  • ???jsp.display-item.citation.isi??? ND
social impact