Elements of information theory
Elements of information theory
An Information-Theoretic Approach to Steganography and Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
A general framework for robust watermarking security
Signal Processing - Special section: Security of data hiding technologies
Watermarking Systems Engineering (Signal Processing and Communications, 21)
Watermarking Systems Engineering (Signal Processing and Communications, 21)
Some general methods for tampering with watermarks
IEEE Journal on Selected Areas in Communications
On achievable security levels for lattice data hiding in the known message attack scenario
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Achieving subspace or key security for WOA using natural or circular watermarking
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes
Proceedings of the 10th ACM workshop on Multimedia and security
Watermarking Security Incorporating Natural Scene Statistics
Information Hiding
Spread-spectrum watermarking security
IEEE Transactions on Information Forensics and Security
Natural watermarking: a secure spread spectrum technique for WOA
IH'06 Proceedings of the 8th international conference on Information hiding
A computational model for watermark robustness
IH'06 Proceedings of the 8th international conference on Information hiding
Provably secure spread-spectrum watermarking schemes in the known message attack framework
IH'10 Proceedings of the 12th international conference on Information hiding
A new spread spectrum watermarking scheme to achieve a trade-off between security and robustness
IH'10 Proceedings of the 12th international conference on Information hiding
Technical Section: Robust and blind mesh watermarking based on volume moments
Computers and Graphics
A survey of watermarking security
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
The return of the sensitivity attack
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Information-theoretic analysis of security in side-informed data hiding
IH'05 Proceedings of the 7th international conference on Information Hiding
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Watermarking is not cryptography
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Hi-index | 0.00 |
This paper puts in consideration the concepts of security and robustness in watermarking, in order to be able to establish a clear frontier between them. A new information-theoretic framework to study data-hiding and watermarking security is proposed, using the mutual information to quantify the information about the secret key that leaks from the observation of watermarked objects. This framework is applied to the analysis of a Spread-Spectrum data-hiding scheme in different scenarios. Finally, we show some interesting links between a measure proposed in previous works in the literature, which is based on Fisher Information Matrix, and our proposed measure.