搜索结果: 1-13 共查到“军队指挥学 watermarking”相关记录13条 . 查询时间(0.057 秒)
A software watermarking scheme enables users to embed a message or mark within a program while preserving its functionality. Moreover, it is difficult for an adversary to remove a watermark from a mar...
Watermarking PRFs under Standard Assumptions: Public Marking and Security with Extraction Queries
Extraction Queries PRF
2018/11/9
A software watermarking scheme can embed some information called a mark into a program while preserving its functionality. No adversary can remove the mark without damaging the functionality of the pr...
Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs
watermarking lattices PRFs
2018/11/5
A software watermarking scheme enables one to embed a "mark" (i.e., a message) within a program while preserving the program's functionality. Moreover, there is an extraction algorithm that recovers a...
DeepSigns: A Generic Watermarking Framework for IP Protection of Deep Learning Models
MLP CNNs
2018/4/4
This paper proposes DeepSigns, a novel end-to-end framework for systematic Watermarking and Intellectual Property (IP) protection in the context of deep learning. DeepSigns, for the first time, introd...
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities
Watermarking Scheme Private Constrained Pseudorandom Function Collusion Resilience
2017/12/19
A cryptographic watermarking scheme embeds message into a program while preserving its functionality. Essential security of the watermarking schemes requires that no one could remove the marking messa...
Watermarking Public-key Cryptographic Functionalities and Implementations
watermarking public -key encryption unremovability,
2017/6/9
A watermarking scheme for a public-key cryptographic functionality enables the embedding of a mark in the instance of the secret-key algorithm such that the functionality of the original scheme is mai...
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
watermarking pseudorandom functions constrained PRFs
2017/5/2
A software watermarking scheme allows one to embed a “mark” into a program without significantly altering the behavior of the program. Moreover, it should be difficult to remove the watermark without ...
Watermarking Cryptographic Programs Against Arbitrary Removal Strategies
watermarking obfuscation pseudorandom function
2015/12/31
A watermarking scheme for programs embeds some information called a mark into a program while preserving its functionality. No adversary can remove the mark without damaging the functionality of the p...
Publicly Verifiable Software Watermarking
indistingushability obfuscation watermarking puncturable PRFs
2015/12/31
Software Watermarking is the process of transforming a program into a functionally equivalent
“marked” program in such a way that it is computationally hard to remove the mark
without destroying fun...
Watermarking Cryptographic Capabilities
watermarking, indistingushability obfuscation puncturable PRFs
2015/12/21
A watermarking scheme for programs embeds some information called a mark into a program while
preserving its functionality. No adversary can remove the mark without damaging the functionality of
the...
On Designatedly Verified(Non-interactive)Watermarking Schemes
Designated verifier watermarks multiple watermarking joint
2009/2/5
Although many watermarking schemes consider the case of
universal verifiability, it is undesirable in some applications. Designated
verification is a possible solution for this problem. Watermarking...
The informal goal of a watermarking scheme is to “mark” a digital object, such as a picture or video, in such a way that it is difficult for an adversary to remove the mark without destroying the cont...
Cryptanalysis of Hwang-Chang’s a Time-Stamp Protocol for Digital Watermarking
Digital watermarks Copyright protection Time-stamping
2008/9/22
In 2005, Hwang et al. [17] proposed a time-stamping protocol for digit
watermarking. They claimed that their scheme is secure against attacks. However, in this
article, we will show that their schem...