CDMA: principles of spread spectrum communication
CDMA: principles of spread spectrum communication
Practical security analysis of dirty paper trellis watermarking
IH'07 Proceedings of the 9th international conference on Information hiding
Fundamentals of data hiding security and their application to spread-spectrum analysis
IH'05 Proceedings of the 7th international conference on Information Hiding
Watermarking security: theory and practice
IEEE Transactions on Signal Processing - Part II
A Constructive and Unifying Framework for Zero-Bit Watermarking
IEEE Transactions on Information Forensics and Security
Applying informed coding and embedding to design a robust high-capacity watermark
IEEE Transactions on Image Processing
Two key estimation techniques for the broken arrows watermarking scheme
Proceedings of the 11th ACM workshop on Multimedia and security
Fast Embedding Technique for Dirty Paper Trellis Watermarking
IWDW '09 Proceedings of the 8th International Workshop on Digital Watermarking
IH'11 Proceedings of the 13th international conference on Information hiding
Hi-index | 0.00 |
Benchmarking watermarking systems now goes beyond only evaluating the ability of the embedded watermark to withstand common signal primitives such as filtering, resampling, lossy compression, D/A-A/D conversions, etc. Evaluation procedures have to consider how much information leaks from a watermarking system since such knowledge could prove most helpful to design very powerful attacks. This paper further refines an attack on dirty paper watermarking schemes which relies on security weaknesses i.e. information leakage. In particular, additional constraints are introduced to be able to handle 'complex' trellises. Moreover, the efficiency of this attack has been evaluated for different trellis configurations. Quite counter-intuitively, increasing the number of states in the trellis seems to enhance both the robustness and the security of the system.