International Conference on Computing and Communication Technologies 2014
DOI: 10.1109/iccct2.2014.7066723
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of ‘A novel copyright protection scheme using Visual Cryptography’

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…However, for a VCLW scheme, the security claiming robustness is meaningful if it meets Kerckhoffs's principle. Further, if the rate of false positive [26] doesn't exceed limit. Among all the seven schemes, Hwang's and Huo's schemes resulted in high false positive rates, indicating that these schemes are insecure as they result in high false positives.…”
Section: Resultsmentioning
confidence: 97%
“…However, for a VCLW scheme, the security claiming robustness is meaningful if it meets Kerckhoffs's principle. Further, if the rate of false positive [26] doesn't exceed limit. Among all the seven schemes, Hwang's and Huo's schemes resulted in high false positive rates, indicating that these schemes are insecure as they result in high false positives.…”
Section: Resultsmentioning
confidence: 97%
“…According to Borra et al [25], color images are used in different social media sites, including Instagram, WhatsApp, and Facebook. These images are moved from one server, network, or computer to another via open networks like wireless networks and the internet, in which they can face different attacks and manipulations [26], [27]. In such circumstances, different techniques for securing color images have been proposed; for example, Phadikar et al [28], put forward blind watermarking techniques based on wavelet transform for color image security.…”
Section: Introductionmentioning
confidence: 99%
“…In these framework, since the detector or the decoder may not find the same locations due to the changes after recompression or imposed attacks, they used a location map or an embedding position template by private key describing embedding location which is used to find the specified locations where the watermark embeds. However, these locations are vulnerable to be identified by attackers [37], [38]. Thus, the security issue is the major problem in these methods [39], [40].…”
Section: Introductionmentioning
confidence: 99%