Elements of information theory
Elements of information theory
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Watermarking security: theory and practice
IEEE Transactions on Signal Processing - Part II
On distortion-compensated dither modulation data-hiding with repetition coding
IEEE Transactions on Signal Processing
Security of Lattice-Based Data Hiding Against the Known Message Attack
IEEE Transactions on Information Forensics and Security
Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding
IEEE Transactions on Information Theory
Spread-spectrum watermarking security
IEEE Transactions on Information Forensics and Security
Hi-index | 0.00 |
This paper presents a security analysis for data hiding methods based on nested lattice codes, extending the analysis provided by previous works. The security is quantified in an information-theoretic sense by means of the information leakage between the watermarked signals seen by the attacker and the secret key used in the embedding process. The theoretical analysis accomplished in the first part of the paper addresses important issues such as the possibility of achieving perfect secrecy and the impact of the embedding rate and channel coding in the security level. In the second part, a practical algorithm for estimating the secret key is proposed, and the information extracted is used for implementing a reversibility attack on real images.