Oracle channels

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The paper is structured into three main parts. In the first part, we focus on information leakage through new covert channels, we term oracle channels, which occur in case oracle attacks are performed on watermarked digital media or multimedia. In the second part, we show how to counteract oracle channels without resorting to protection tools that are quite demanding for communication networks. In the third part, we follow the information-theoretic approach to show that the countermeasures proposed in the second part do reduce the secret information leakage that flows through oracle channels, without sensibly compromising the detector reliability in case no oracle attack is performed. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Venturini, I. (2008). Oracle channels. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4920 LNCS, pp. 50–69). https://doi.org/10.1007/978-3-540-69019-1_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free