Independent component analysis: algorithms and applications
Neural Networks
The role of information theory in watermarking and its application to image watermarking
Signal Processing - Special section on information theoretic aspects of digital watermarking
A general framework for robust watermarking security
Signal Processing - Special section: Security of data hiding technologies
ICA for watermarking digital images
The Journal of Machine Learning Research
Independent component analysis applied to digital image watermarking
ICASSP '01 Proceedings of the Acoustics, Speech, and Signal Processing, 2001. on IEEE International Conference - Volume 03
An asymmetric watermarking method
IEEE Transactions on Signal Processing
Scalar Costa scheme for information embedding
IEEE Transactions on Signal Processing
Watermarking security: theory and practice
IEEE Transactions on Signal Processing - Part II
IEEE Transactions on Information Theory
Fast and robust fixed-point algorithms for independent component analysis
IEEE Transactions on Neural Networks
Proceedings of the 9th workshop on Multimedia & security
Cryptanalysis of barni et al. watermarking scheme
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Desynchronization in compression process for collusion resilient video fingerprint
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Hi-index | 0.00 |
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proportional to the difficulty the opponent has to recover the secret parameters, which are, in WSS watermarking scheme, the private carriers. Both theoretical and practical points of view are investigated when several pieces of content are watermarked with the same secret key. The opponent's difficulty is measured by the amount of data necessary to estimate accurately the private carriers, and also by the complexity of the estimation algorithms. Actually, Blind Source Separation algorithms really help the opponent exploiting the information leakage to disclose the secret carriers. The article ends with experiments comparing blind attacks to these new hacks. The main goal of the article is to warn watermarkers that embedding hidden messages with the same secret key might is a dangerous security flaws.