CDMA: principles of spread spectrum communication
CDMA: principles of spread spectrum communication
On achievable security levels for lattice data hiding in the known message attack scenario
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Achieving subspace or key security for WOA using natural or circular watermarking
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Security pitfalls of frame-by-frame approaches to video watermarking
IEEE Transactions on Signal Processing - Part II
Applying informed coding and embedding to design a robust high-capacity watermark
IEEE Transactions on Image Processing
Proceedings of the 9th workshop on Multimedia & security
Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes
Proceedings of the 10th ACM workshop on Multimedia and security
EURASIP Journal on Information Security
Optimization of natural watermarking using transportation theory
Proceedings of the 11th ACM workshop on Multimedia and security
Security evaluation of informed watermarking schemes
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Towards robust and secure watermarking
Proceedings of the 12th ACM workshop on Multimedia and security
Hi-index | 0.00 |
This paper analyses the security of dirty paper trellis (DPT) watermarking schemes which use both informed coding and informed embedding. After recalling the principles of message embedding with DPT watermarking, the secret parameters of the scheme are highlighted. The security weaknesses of DPT watermarking are then presented: in the watermarked contents only attack (WOA) setup, the watermarked dataset exhibits clusters corresponding to the different patterns attached to the arcs of the trellis. The K-means clustering algorithm is used to estimate these patterns and a co-occurrence analysis is performed to retrieve the connectivity of the trellis. Experimental results demonstrate that it is possible to accurately estimate the trellis configuration, which enables to perform attacks much more efficient than simple additive white Gaussian noise (AWGN).