A Grouping Principle and Four Applications
IEEE Transactions on Pattern Analysis and Machine Intelligence
A general framework for robust watermarking security
Signal Processing - Special section: Security of data hiding technologies
Proceedings of the 9th workshop on Multimedia & security
On-off keying modulation and tardos fingerprinting
Proceedings of the 10th ACM workshop on Multimedia and security
EURASIP Journal on Information Security
Two key estimation techniques for the broken arrows watermarking scheme
Proceedings of the 11th ACM workshop on Multimedia and security
Optimization of natural watermarking using transportation theory
Proceedings of the 11th ACM workshop on Multimedia and security
Practical security analysis of dirty paper trellis watermarking
IH'07 Proceedings of the 9th international conference on Information hiding
Watermarking security: theory and practice
IEEE Transactions on Signal Processing - Part II
A Constructive and Unifying Framework for Zero-Bit Watermarking
IEEE Transactions on Information Forensics and Security
Security of Lattice-Based Data Hiding Against the Known Message Attack
IEEE Transactions on Information Forensics and Security
Hi-index | 0.00 |
This paper presents yet another attempt towards robust and secure watermarking. Some recent works have looked at this issue first designing new watermarking schemes with a security oriented point of view, and then evaluating their robustness compared to state-of-the-art but unsecure techniques. Our approach is, on contrary, to start from a very robust watermarking technique and to propose changes in order to strengthen its security levels. These changes include the introduction of a security criterion, an embedding process implemented as a maximization of a robustness metric under the perceptual and the security constraints, and a watermarking detection seen as a contrario decision test. Our experimentations lead to, once again, a trade-off between security and robustness. The technique is now perfectly secure against attacks mounted during the second edition of the BOWS challenge, but the price to pay is either a lower robustness against common image processing, either a bigger probability of false alarm.