H Liu, Y Mo, KH Johansson - Safety, Security and Privacy for Cyber …, 2021 - Springer
… watermark design approaches for Cyber-Physical Systems (CPS). We focus on how to design physical watermarking to actively … A similar problem is studied for multi-agent systems in […
O Hosam - International Journal of Information Technology and …, 2019 - mecs-press.net
… watermarking algorithms are used for keeping the watermark robust to attacks. When the attacker tries to perturb the carrier image to remove the watermark… active and passive attacks. In …
… of malicious agents, while the latter actively perturb signals to … Here we focus on the active detection method proposed in [8]… To avoid this, we consider that the watermark systems have …
Y Luo, T Zhou, S Cui, Y Ye, F Liu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
… the embedded image Iem contains a watermark from the perspective of active plagiarizers. … 1) embedding watermarks in multi-patches can help at least one watermark handle distortion …
… image, protection of database integrity is now a very active research in digital watermarking. … Our technique is called zero-watermarking technique because watermark bits are not …
H Liu, Y Li, QL Han, T Raïssi - IEEE Transactions on Automatic …, 2022 - ieeexplore.ieee.org
… is used to generate watermarked input signals that can actively authenticate the dynamics … if the watermarking exists. Different from some existing results based on the watermark, the …
J Hou, Q Li, R Tan, S Meng, H Zhang, S Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
… is modulated actively according to the specified watermark implementation strategy. Then the original watermarking signal is carried by network flow. The original watermark and the …
… the effect of an active attack detection with watermarking by employing the RB to … watermark signal injection from the controllers’ signals. The design of the attack detector and watermark …
… design of the watermark filters. In particular, we show how the watermarking scheme can be … Remark 1: The rationale for including the proposed activewatermarking scheme is to make …