Elements of information theory
Elements of information theory
Independent component analysis: algorithms and applications
Neural Networks
Digital watermarking
Variational mixture of Bayesian independent component analyzers
Neural Computation
Fundamentals of data hiding security and their application to spread-spectrum analysis
IH'05 Proceedings of the 7th international conference on Information Hiding
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Watermarking security: theory and practice
IEEE Transactions on Signal Processing - Part II
An information fidelity criterion for image quality assessment using natural scene statistics
IEEE Transactions on Image Processing
Fast and robust fixed-point algorithms for independent component analysis
IEEE Transactions on Neural Networks
Security Analysis for Spread-Spectrum Watermarking Incorporating Statistics of Natural Images
ISVC '08 Proceedings of the 4th International Symposium on Advances in Visual Computing, Part II
Security analysis of ISS watermarking using natural scene statistics
IH'10 Proceedings of the 12th international conference on Information hiding
Hi-index | 0.00 |
Watermarking security has emerged as the domain of extensive research in recent years. This paper presents both information theoretic analysis and practical attack algorithm for spread-spectrum based watermarking security incorporating natural scene statistics (NSS) model. Firstly, the Gaussian scale mixture (GSM) is introduced as the NSS model. The security is quantified by the mutual information between the observed watermarked signals and the secret carriers. The new security measures are then derived based on the GSM model, which allows for more accurate evaluation of watermarking security. Finally, the practical attack algorithm is developed in the framework of variational Bayesian ICA, which is shown to increase the performance and flexibility by allowing incorporation of prior knowledge of host signal. Extensive simulations are carried out to demonstrate the feasibility and effectiveness of the proposed algorithm.