New Attacks on Timing-based Network Flow Watermarks.
Zi LinNicholas HopperPublished in: USENIX Security Symposium (2012)
Keyphrases
- network flow
- watermarking scheme
- watermarking algorithm
- watermarking technique
- semi fragile watermarking
- image watermarking
- watermarking method
- digital watermarking
- minimum cost
- digital images
- linear programming
- digital watermark
- copyright protection
- integer programming
- network flow problem
- min cost
- spread spectrum
- image authentication
- jpeg compression
- traffic control
- optimization model
- watermark embedding
- set cover
- bipartite graph
- watermark detection
- watermarked image
- digital content
- data hiding