Achieving subspace or key security for WOA using natural or circular watermarking
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Spread-spectrum watermarking security
IEEE Transactions on Information Forensics and Security
Natural watermarking: a secure spread spectrum technique for WOA
IH'06 Proceedings of the 8th international conference on Information hiding
Fundamentals of data hiding security and their application to spread-spectrum analysis
IH'05 Proceedings of the 7th international conference on Information Hiding
Improved spread spectrum: a new modulation technique for robust watermarking
IEEE Transactions on Signal Processing
Watermarking security: theory and practice
IEEE Transactions on Signal Processing - Part II
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
IEEE Transactions on Information Forensics and Security
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Hi-index | 0.00 |
To achieve a trade-off between robustness and security in the Watermarked Only Attack (WOA) framework, we propose a novel spread spectrum watermarking scheme called natural watermarking-normalized circular watermarking (NW-NCW). Our scheme builds on two spread spectrum watermarking schemes. One is natural watermarking (NW), and has an advantage in security; the other is a novel circular watermarking scheme called normalized circular watermarking (NCW), and has an advantage in robustness. We show that in most typical scenarios, NW-NCW is more suitable for the tradeoff between robustness and security than the existing secure watermarking schemes such as NW and CW-ISS (circular extension of ISS).