Digital watermarking
ICA for watermarking digital images
The Journal of Machine Learning Research
Multiple Digital Watermarking Scheme Based on ICA
WIAMIS '07 Proceedings of the Eight International Workshop on Image Analysis for Multimedia Interactive Services
Sensitivity Analysis for the Problem of Matrix Joint Diagonalization
SIAM Journal on Matrix Analysis and Applications
Watermarking: how secure is the DM-QIM embedding technique?
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
IEEE Transactions on Information Forensics and Security
Hi-index | 0.00 |
We have recently proposed the framework of independent blind source separation as an advantageous approach to steganography. Amongst the several characteristics noted was a sensitivity to message reconstruction due to small perturbations in the sources. This characteristic is not common in most other approaches to steganography. In this paper we discuss how this sensitivity relates the joint diagonalisation inside the independent component approach, and reliance on exact knowledge of secret information, and how it can be used as an additional and inherent security mechanism against malicious attack to discovery of the hidden messages. The paper therefore provides an enhanced mechanism that can be used for e-document forensic analysis and can be applied to different dimensionality digital data media. In this paper we use a low dimensional example of biomedical time series as might occur in the electronic patient health record, where protection of the private patient information is paramount.