Watermark-Only Security Attack on DM-QIM Watermarking: Vulnerability to Guided Key Guessing.
B. R. MatamDavid LowePublished in: Int. J. Digit. Crime Forensics (2010)
Keyphrases
- watermarking algorithm
- digital watermark
- security vulnerabilities
- watermarking scheme
- jpeg compression
- watermarking technique
- data hiding
- copyright protection
- denial of service
- buffer overflow
- block cipher
- digital images
- dos attacks
- penetration testing
- digital watermarking
- image watermarking
- signal processing
- quantization index modulation
- spread spectrum
- security measures
- information hiding
- countermeasures
- security risks
- watermarking method
- robust image watermarking
- intrusion detection
- information security
- wavelet domain
- error correction
- denial of service attacks
- attack graphs
- cyber attacks
- watermark detection
- digital image watermarking
- authentication protocol
- network security
- image authentication
- geometric attacks
- video watermarking
- spatial domain
- watermark embedding
- lossy compression
- image processing operations
- data corruption
- watermarked image
- robust watermarking
- attack scenarios
- image fidelity
- intrusion detection system
- fragile watermarking
- dct coefficients