完整後設資料紀錄
DC 欄位語言
dc.contributor.authorChen, ITen_US
dc.contributor.authorYeh, YSen_US
dc.date.accessioned2014-12-08T15:17:00Z-
dc.date.available2014-12-08T15:17:00Z-
dc.date.issued2006-04-01en_US
dc.identifier.issn1070-9908en_US
dc.identifier.urihttp://dx.doi.org/10.1109/LSP.2005.863677en_US
dc.identifier.urihttp://hdl.handle.net/11536/12443-
dc.description.abstractAsymmetric watermarking schemes have been widely discussed recently. Transformed-key asymmetric watermarking (TKAW) system is one of the schemes,which was proposed by Choi et al. This letter discusses the weaknesses of TKAW. In TKAW, the inner product of the received signal and public key almost equals to zero. As a result, it cannot resist projection attack. To prove this point, we will demonstrate how to find the most relevant unwatermarked signal (y) over tilde for a given watermark embedded signal y and prove that parallel to y-(y) over tilde parallel to <= vertical bar alpha vertical bar, where alpha is a constant adjusted to a value that makes the watermark imperceptible. Moreover, we also find that the feature y-(y) over tilde, a predicted watermark of a stego image, can be copied from a stego image to another image, which means that the TKAW system cannot resist copy attack either.en_US
dc.language.isoen_USen_US
dc.subjectasymmetric watermarkingen_US
dc.subjectcopy attacken_US
dc.subjectprojection attacken_US
dc.subjecttransformed keyen_US
dc.titleSecurity analysis of transformed-key asymmetric watermarking systemen_US
dc.typeArticleen_US
dc.identifier.doi10.1109/LSP.2005.863677en_US
dc.identifier.journalIEEE SIGNAL PROCESSING LETTERSen_US
dc.citation.volume13en_US
dc.citation.issue4en_US
dc.citation.spage213en_US
dc.citation.epage215en_US
dc.contributor.department資訊工程學系zh_TW
dc.contributor.departmentDepartment of Computer Scienceen_US
dc.identifier.wosnumberWOS:000236153100008-
dc.citation.woscount4-
顯示於類別:期刊論文


文件中的檔案:

  1. 000236153100008.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。