A general framework for robust watermarking security
Signal Processing - Special section: Security of data hiding technologies
Achieving subspace or key security for WOA using natural or circular watermarking
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Natural watermarking: a secure spread spectrum technique for WOA
IH'06 Proceedings of the 8th international conference on Information hiding
Fundamentals of data hiding security and their application to spread-spectrum analysis
IH'05 Proceedings of the 7th international conference on Information Hiding
Improved spread spectrum: a new modulation technique for robust watermarking
IEEE Transactions on Signal Processing
Watermarking security: theory and practice
IEEE Transactions on Signal Processing - Part II
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
IEEE Transactions on Information Forensics and Security
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Hi-index | 0.00 |
This paper firstly defines the concept of security classes for spread-spectrum watermarking schemes in a Known Message Attack (KMA) framework. In particular, we define three security classes, namely, by order of increasing security: insecurity, key-security and subspacesecurity. Then, we present three new spread spectrum watermarking schemes, namely, independent natural watermarking (INW), robust independent natural watermarking (Robust-INW) and independent circular watermarking (ICW). All these new watermarking schemes build on the uniformly distributed random orthogonal matrix which can be estimated by the decoder. And all these schemes (i.e., INW, Robust-INW and ICW) are secure against carriers estimation in the KMA framework.