Elements of information theory
Elements of information theory
An introduction to signal detection and estimation (2nd ed.)
An introduction to signal detection and estimation (2nd ed.)
Independent component analysis, a new concept?
Signal Processing - Special issue on higher order statistics
Matrix computations (3rd ed.)
The Geometry of Algorithms with Orthogonality Constraints
SIAM Journal on Matrix Analysis and Applications
A general framework for robust watermarking security
Signal Processing - Special section: Security of data hiding technologies
Singular random matrix decompositions: Jacobians
Journal of Multivariate Analysis
Handbook of Mathematical Functions, With Formulas, Graphs, and Mathematical Tables,
Handbook of Mathematical Functions, With Formulas, Graphs, and Mathematical Tables,
Achieving subspace or key security for WOA using natural or circular watermarking
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
EURASIP Journal on Information Security
Exploiting security holes in lattice data hiding
IH'07 Proceedings of the 9th international conference on Information hiding
Security of DM quantization watermarking schemes: a practical study for digital images
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Fundamentals of data hiding security and their application to spread-spectrum analysis
IH'05 Proceedings of the 7th international conference on Information Hiding
Improved spread spectrum: a new modulation technique for robust watermarking
IEEE Transactions on Signal Processing
IEEE Transactions on Signal Processing
Scalar Costa scheme for information embedding
IEEE Transactions on Signal Processing
The zero-rate spread-spectrum watermarking game
IEEE Transactions on Signal Processing
New Algorithms for Blind Equalization: The Constant Norm Algorithm Family
IEEE Transactions on Signal Processing
Watermarking security: theory and practice
IEEE Transactions on Signal Processing - Part II
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
IEEE Transactions on Information Forensics and Security
Security of Lattice-Based Data Hiding Against the Known Message Attack
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Theory
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Fast and robust fixed-point algorithms for independent component analysis
IEEE Transactions on Neural Networks
Two key estimation techniques for the broken arrows watermarking scheme
Proceedings of the 11th ACM workshop on Multimedia and security
Optimization of natural watermarking using transportation theory
Proceedings of the 11th ACM workshop on Multimedia and security
Rights protection of trajectory datasets with nearest-neighbor preservation
The VLDB Journal — The International Journal on Very Large Data Bases
Security analysis of ISS watermarking using natural scene statistics
IH'10 Proceedings of the 12th international conference on Information hiding
A new spread spectrum watermarking scheme to achieve a trade-off between security and robustness
IH'10 Proceedings of the 12th international conference on Information hiding
IH'11 Proceedings of the 13th international conference on Information hiding
A new measure of watermarking security applied on QIM
IH'12 Proceedings of the 14th international conference on Information Hiding
Hi-index | 0.00 |
This paper presents both theoretical and practical analyses of the security offered by watermarking and data hiding methods based on spread spectrum. In this context, security is understood as the difficulty of estimating the secret parameters of the embedding function based on the observation of watermarked signals. On the theoretical side, the security is quantified from an information-theoretic point of view by means of the equivocation about the secret parameters. The main results reveal fundamental limits and bounds on security and provide insight into other properties, such as the impact of the embedding parameters, and the tradeoff between robustness and security. On the practical side, workable estimators of the secret parameters are proposed and theoretically analyzed for a variety of scenarios, providing a comparison with previous approaches, and showing that the security of many schemes used in practice can be fairly low.