IBM Systems Journal
Batch steganography and pooled steganalysis
IH'06 Proceedings of the 8th international conference on Information hiding
Watermarking security: theory and practice
IEEE Transactions on Signal Processing - Part II
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
IEEE Transactions on Information Forensics and Security
Multiple Image Watermarking Applied to Health Information Management
IEEE Transactions on Information Technology in Biomedicine
IEEE Transactions on Information Theory
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Hi-index | 0.00 |
Evaluation of the security of data hiding methods has gained considerable interest recently. The security of quantisation index modulation (QIM) based watermark embedding methods has previously been investigated for different classes of attacks including known-message attack, known-original attack and watermark-only attack. In this paper, an extreme case of the watermark-only attack scenario is discussed wherein only a single instance of a set of watermarked content is available. We challenge the security of the dither modulation (DM)-QIM based embedding method by examining feature space embeddings for time series and images, using a distribution-free algorithm to discover the primary key embedding parameters.