2013
DOI: 10.1007/978-3-642-45043-3_6
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Provably Resilient Scheme for Graph-Based Watermarking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0
1

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(23 citation statements)
references
References 12 publications
0
22
0
1
Order By: Relevance
“…, S i−1 }. For example, the increasing subsequences of the permutation π = (5,6,2,8,1,9,7,4,3) are S 1 = (5,6,8,9), S 2 = (2, 7) since π ′ = π\S 1 = (2, 1, 7, 4, 3), S 3 = (1, 4), and S 4 = (3), while its decreasing subsequences are S 1 = (5, 2, 1), S 2 = (6, 4, 3), S 3 = (8, 7), and S 4 = (9).…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…, S i−1 }. For example, the increasing subsequences of the permutation π = (5,6,2,8,1,9,7,4,3) are S 1 = (5,6,8,9), S 2 = (2, 7) since π ′ = π\S 1 = (2, 1, 7, 4, 3), S 3 = (1, 4), and S 4 = (3), while its decreasing subsequences are S 1 = (5, 2, 1), S 2 = (6, 4, 3), S 3 = (8, 7), and S 4 = (9).…”
Section: Preliminariesmentioning
confidence: 99%
“…if the element i d-dominates the element j in π * ; (iii) we create two dummy vertices s = v n * +1 and t = v 0 and we add them both in V (D[π * ]); then, we add in E(D[π * ]) the directed edge (s, v i ) for every v i with indegree equal to 0, and the edge (v j , t) for every v j with outdegree equal to 0. Figure 3 depicts the graph D[π * ] of the permutation π * = (5,6,9,8,1,2,7,4,3). Note that, by construction, i > j for every directed edge (v i , v j ) of D[π * ] since the element i d-dominates the element j in π * .…”
Section: Codec Algorithms For Phase Sip-rpgmentioning
confidence: 99%
“…We start with this basic version to better understand each proposed modification, and we evolve to the final protocol step by step after considering several possible attack models. Concretely, Alice, a software developer, generates a large number of equivalent versions of the same softwarewhich can be achieved via the use of software diversity tools-and each version is distinctly watermaked by Alice-using an watermarking scheme at choice, such as the ones in [36] and references thereby. …”
Section: Initial Fingerprinting Protocol Based On Oblivious Transfermentioning
confidence: 99%
“…To avoid this attack, the arbitrator must verify that Alice, in fact, generated α artifacts with distinct fingerprints. A recent work about the generation and verification of distinct fingerprints based on a randomized graph-based scheme can be found in [36].…”
Section: Fingerprinting Protocol With Guarantee Of Distinct Fingerprintsmentioning
confidence: 99%
See 1 more Smart Citation