Please use this identifier to cite or link to this item: https://scholarbank.nus.edu.sg/handle/10635/43127
DC FieldValue
dc.titleSecurity of public watermarking schemes for binary sequences
dc.contributor.authorLi, Q.
dc.contributor.authorChang, E.-C.
dc.date.accessioned2013-07-23T09:25:43Z
dc.date.available2013-07-23T09:25:43Z
dc.date.issued2003
dc.identifier.citationLi, Q., Chang, E.-C. (2003). Security of public watermarking schemes for binary sequences. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2578 : 119-128. ScholarBank@NUS Repository.
dc.identifier.issn03029743
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/43127
dc.description.abstractIn this paper, we focus on the security aspect of public watermarking schemes. Specifically, given a watermarked sequence Ĩ, we consider smart attackers whose task is to find a non-watermarked sequence I′ using as few calls to the publicly available detection routine as possible. We restrict the media to binary sequences and use Hamming distance as the measure. We study a class of watermarking schemes and give an attacker who uses expected O(d(1 + log(n/k))) calls to find such I′, where d and k are determined by the false alarm and distortion of the scheme, and n is the length of the sequence. This attacker is optimal when k = o(n). By taking the number of calls required as a measure of the security, we can trade-off the requirements on security, false alarm and distortion. © Springer-Verlag Berlin Heidelberg 2003.
dc.sourceScopus
dc.typeArticle
dc.contributor.departmentTEMASEK LABORATORIES
dc.contributor.departmentCOMPUTATIONAL SCIENCE
dc.description.sourcetitleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.description.volume2578
dc.description.page119-128
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.