Broken Arrows
This paper makes an account of the design and investigations done for the still image watermarking technique used in the 2nd edition of the BOWS challenge. This technique is named “broken arrows” for some reas...
Page 5 of 5
This paper makes an account of the design and investigations done for the still image watermarking technique used in the 2nd edition of the BOWS challenge. This technique is named “broken arrows” for some reas...
Spread-spectrum watermarking is generally considered to be robust against collusion attacks, and thereby suitable for digital fingerprinting. We have previously introduced the minority extreme attack (IWDW' 07...
The design and preliminary evaluation of a pressure sensor-based typing biometrics authentication system (PBAS) is discussed in this paper. This involves the integration of pressure sensors, signal processing ...
The use of digital watermarking in real applications is impeded by the weakness of current available algorithms against signal processing manipulations leading to the desynchronization of the watermark embedde...
We propose a joint encryption and compression (JEC) scheme with emphasis on application to video data. The proposed JEC scheme uses the philosophy of distributed source coding with side information to reduce t...
A novel syntax-compliant encryption primitive and an efficient syntax-compliant JPEG 2000 encryption scheme are presented in this paper. The syntax-compliant encryption primitive takes, as input, syntax-compli...
JPEG2000 encryption has become a widely discussed topic and quite a number of contributions have been made. However, little is known about JPEG2000 compression parameters and their influence on the security an...
The first break our watermarking system (BOWS) contest challenged researchers to remove the watermark from three given images. Participants could submit altered versions of the images to an online detector. Fo...
We discuss a robust image authentication scheme based on a hash string constructed from leading JPEG2000 packet data. Motivated by attacks against the approach, key-dependency is added by means of employing a ...
Zero-knowledge watermark detectors presented to date are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of being attacked by sensit...
An objective performance measure is proposed to evaluate the intelligibility of a speech signal having its frequency subbands permuted. The proposed tool can be used to generate efficient keys for frequency do...
From December 15, 2005 to June 15, 2006, the watermarking community was challenged to remove the watermark from 3 different 512×512 watermarked images while maximizing the peak signal-to-noise ratio (PSNR) measur...
Multimedia fingerprinting, also known as robust or perceptual hashing, aims at representing multimedia signals through compact and perceptually significant descriptors (hash values). In this paper, we examine ...
One of the most important problems facing any distributed application over a heterogeneous network is the protection of private sensitive information in local terminals. A subfield of cryptography called secur...
The Break Our Watermarking System (BOWS) contest gave researchers three months to defeat an unknown watermark, given three marked images and online access to a watermark detector. The authors participated in t...
Processing encrypted signals requires special properties of the underlying encryption scheme. A possible choice is the use of homomorphic encryption. In this paper, we propose a selection of the most important...
Fingerprinting is an essential tool to shun legal buyers of digital content from illegal redistribution. In fingerprinting schemes, the merchant embeds the buyer's identity as a watermark into the content so t...
This paper describes an audio watermarking scheme based on sinusoidal signal modeling. To embed a watermark in an original signal (referred to as a cover signal hereafter), the following steps are taken. (a) A sh...
This paper analyzes the robustness properties of 2D chaotic map image encryption schemes. We investigate the behavior of such block ciphers under different channel error types and find the transmission error r...
This work investigates the problem of efficient multimedia data encryption. A novel methodology is proposed to achieve encryption by controlling certain operations in the data compression process using a secre...
The break our watermarking system (BOWS) contest was launched in the framework of the activities carried out by the European Network of Excellence for Cryptology ECRYPT. The aim of the contest was to investiga...
We introduce the concept of joint source coding, channel coding, and secrecy. In particular, we propose two practical joint schemes: the first one is based on error-correcting randomized arithmetic codes, whil...
A novel encryption model for digital videos is presented. The model relies on the encryption-compression duality of certain types of permutations acting on video frames. In essence, the proposed encryption pro...
The problem of secure data processing by means of a neural network (NN) is addressed. Secure processing refers to the possibility that the NN owner does not get any knowledge about the processed data since the...
Learn more about the impact the EURASIP Journal on Information Security has worldwide
2022 Citation Impact
3.6 - 2-year Impact Factor
3.6 - 5-year Impact Factor
1.461 - SNIP (Source Normalized Impact per Paper)
0.901 - SJR (SCImago Journal Rank)
2023 Speed
39 days submission to first editorial decision for all manuscripts (Median)
141 days submission to accept (Median)
2023 Usage
289,389 downloads