- document
-
Maesen, Palle (author)The media watermarking technique domain has had the last 30 years to develop itself. The non-media side, however, is a way newer sub-domain. [1] The data-gathering process for machine learning algorithms is a tedious and time consuming task. This becomes worse as the scale of these algorithms increases. Thus, protecting the datasets against...bachelor thesis 2023
- document
-
Hristov, Tsvetomir (author)Although digital watermarking has been a well-researched topic for the past decades and has seen numerous implementations for relational databases, it still lacks research for non-relational schema-less databases. In this paper, we explore proposed techniques for non-relational database watermarking and introduce an improved technique for NoSQL...bachelor thesis 2023
- document
-
Nierop, Jaden (author)Digital watermarking has been used extensively in media in recent years. Yet, there are still relatively few techniques for watermarking 3D meshes. In this paper we implement a watermarking algorithm proposed by O. Benedens that encodes a bit string in the distribution of the normals of the faces of the mesh and investigate a method to improve...bachelor thesis 2023
- document
-
van den Broek, Geert (author)An Industrial Control System (ICS) is used to monitor and control industrial processes and critical infrastructure, and is therefore crucial to modern society. This makes them attractive targets for malicious cyber-attacks, which have become more advanced and abundant in recent history. To properly defend ICSs from these cyber-attacks,...master thesis 2022
- document
-
Alkhafaji, Ali A.R. (author), Sjarif, Nilam Nur Amir (author), Shahidan, M.A (author), Azmi, Nurulhuda Firdaus Mohd (author), Sarkan, Haslina Md (author), Chuprat, Suriayati (author), Khalaf, Osamah Ibrahim (author), Al-Khanak, Ehab Nabiel (author)The most sensitive Arabic text available online is the digital Holy Quran. This sacred Islamic religious book is recited by all Muslims worldwide including non-Arabs as part of their worship needs. Thus, it should be protected from any kind of tampering to keep its invaluable meaning intact. Different characteristics of Arabic letters like the...journal article 2021
- document
-
Ferrari, Riccardo M.G. (author), Teixeira, Andre M.H. (author)This article addresses the detection of stealthy attacks on sensor measurements. Inspired in authentication schemes with weak cryptographic guarantees, we propose a watermarking approach to validate the data and its source. In particular, we propose a multiplicative scheme, where the sensor outputs are watermarked by a bank of filters, then...journal article 2021
- document
-
Gramatikov, S.T. (author)Cyber-attacks long have been a topic reserved for sci-fi movies and books. With the advance of internet and the globalisation of technology supply chains, as well as the growing political and economic pressure around the world, cyber warfare has become the new weapon of choice for covert state operations, but also rogue organizations. In the...master thesis 2020
- document
-
Boonekamp, F.J. (author), Dashko, S. (author), Duiker, Donna (author), Gehrmann, T. (author), van den Broek, M.A. (author), den Ridder, M.J. (author), Pabst, Martin (author), Robert, Vincent (author), Abeel, T.E.P.M.F. (author), Postma, E.D. (author), Daran, J.G. (author), Daran-Lapujade, P.A.S. (author)The construction of powerful cell factories requires intensive and extensive remodelling of microbial genomes. Considering the rapidly increasing number of these synthetic biology endeavors, there is an increasing need for DNA watermarking strategies that enable the discrimination between synthetic and native gene copies. While it is well...journal article 2020
- document
-
Mooren, Maurits (author)With the increasing amount of information sent in control systems, data is more often communicated through a communication network. These networked control systems use the network to exchange control and feedback signals among the system’s components. Data sent over a network attracts adversaries that try to read and modify this data. These...master thesis 2019
- document
-
Teixeira, Andre M.H. (author), Ferrari, Riccardo M.G. (author)In this paper, the problem of detecting stealthy false-data injection attacks on the measurements is considered. We propose a multiplicative watermarking scheme, where each sensor’s output is individually fed to a SISO watermark generator whose parameters are supposed to be unknown to the adversary. Under such a scenario, the detectability...conference paper 2018
- document
-
Abbasfard, M. (author)Watermarking is the process of inserting predefined patterns into multimedia data in a way that the degradation of quality is minimized and remain at an imperceptible level. Many digital watermarking algorithms have been proposed in special and transform domains. The techniques in the spatial domain still have relatively low-bit capacity and are...master thesis 2009
- document
-
Wang, J. (author), Shterev, I.D. (author), Lagendijk, R.L. (author)This paper presents a scheme for estimating two-band amplitude scale attack within a quantization-based watermarking context. Quantization-based watermarking schemes comprise a class of watermarking schemes that achieves the channel capacity in terms of additive noise attacks1. Unfortunately, Quantization-based watermarking schemes are not...conference paper 2006
- document
-
Shterev, I.D. (author), Lagendijk, R.L. (author)Quantization-based watermarking schemes comprise a class of watermarking schemes that achieves the channel capacity in terms of additive noise attacks.1 The existence of good high dimensional lattices that can be efficiently implemented2–4 and incorporated into watermarking structures, made quantization-based watermarking schemes of practical...conference paper 2005
- document
-
Shterev, I.D. (author), Lagendijk, I.L. (author), Heusdens, R. (author)Quantization-based watermarking schemes are vulnerable to amplitude scaling. Therefore the scaling factor has to be accounted for either at the encoder, or at the decoder, prior to watermark decoding. In this paper we derive the marginal probability density model for the watermarked and attacked data, when the attack channel consists of...conference paper 2004
- document
-
Lichtenauer, J. (author), Setyawan, I. (author), Lagendijk, R. (author)A possible solution to the difficult problem of geometrical distortion of watermarked images in a blind watermarking scenario is to use a template grid in the autocorrelation function. However, the important drawback of this method is that the watermark itself can be estimated and subtracted, or the peaks in the Fourier magnitude spectrum can be...conference paper 2004
- document
-
Setyawan, I. (author)The main focus of this thesis is the problem of geometric distortion in image and video watermarking. In this thesis we discuss the two aspects of the geometric distortion problem, namely the watermark desynchronization aspect and the perceptual quality assessment aspect. Furthermore, this thesis also discusses the challenges of watermarking...doctoral thesis 2004