Elements of information theory
Elements of information theory
Fundamentals of data hiding security and their application to spread-spectrum analysis
IH'05 Proceedings of the 7th international conference on Information Hiding
Scalar Costa scheme for information embedding
IEEE Transactions on Signal Processing
IEEE Transactions on Information Theory
Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding
IEEE Transactions on Information Theory
Achieving subspace or key security for WOA using natural or circular watermarking
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Assessing motion-coherency in video watermarking
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Natural watermarking: a secure spread spectrum technique for WOA
IH'06 Proceedings of the 8th international conference on Information hiding
A survey of watermarking security
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Transactions on Data Hiding and Multimedia Security I
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Watermarking is not cryptography
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Hi-index | 0.00 |
In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa's dirty paper scheme. We quantify the information about the secret key that leaks from the observation of watermarked signals, using the mutual information as analytic tool for providing a fair comparison between the original Costa's scheme, Distortion Compensated – Dither Modulation and Spread Spectrum.