Analysis of digital watermarks subjected to optimum linear filtering and additive noise
Signal Processing - Special section on information theoretic aspects of digital watermarking
Informed Watermarking
A Stochastic Approach to Content Adaptive Digital Image Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
An Information-Theoretic Approach to Steganography and Watermarking
IH '99 Proceedings of the Third International Workshop on Information Hiding
Fast Robust Template Matching for Affine Resistant Image Watermarks
IH '99 Proceedings of the Third International Workshop on Information Hiding
Automatic Detection of a Watermarked Document Using a Private Key
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Second Generation Benchmarking and Application Oriented Evaluation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
An asymmetric watermarking method
IEEE Transactions on Signal Processing
IEEE Transactions on Information Theory
IEEE Journal on Selected Areas in Communications
Some general methods for tampering with watermarks
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
On achievable security levels for lattice data hiding in the known message attack scenario
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
A new approach to covert communication via PDF files
Signal Processing
Spread-spectrum watermarking security
IEEE Transactions on Information Forensics and Security
A computational model for watermark robustness
IH'06 Proceedings of the 8th international conference on Information hiding
A blind watermarking scheme based on visual model for copyright security
MCAM'07 Proceedings of the 2007 international conference on Multimedia content analysis and mining
Transactions on data hiding and multimedia security III
Asymptotically optimum universal watermark embedding and detection in the high-SNR regime
IEEE Transactions on Information Theory
Reversible data hiding algorithm based on prediction error
CAR'10 Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 3
Towards robust and secure watermarking
Proceedings of the 12th ACM workshop on Multimedia and security
Provably secure spread-spectrum watermarking schemes in the known message attack framework
IH'10 Proceedings of the 12th international conference on Information hiding
A survey of watermarking security
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Watermarking attack: security of WSS techniques
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Fundamentals of data hiding security and their application to spread-spectrum analysis
IH'05 Proceedings of the 7th international conference on Information Hiding
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Information theory applications in error bit rate analysis of digital image watermarking
Computers and Electrical Engineering
Hi-index | 0.06 |
The analysis of the security of watermarking algorithms has received increasing attention since it has been recognized that the sole investigation of robustness issues is not enough to properly address the challenges set by practical applications. Such a security analysis, though, is still in its infancy, up to a point that a general agreement has not yet been reached even on the most fundamental problems. The purpose of this paper is to provide a general security framework encompassing most of the problems encountered in real-world applications. By considering the amount of information the attacker has about the watermarking algorithm, we introduce the notion of fair and un-fair attacks, so to ease the classification of different systems and attacks. Though we recognize that many important differences exist between watermarking and cryptographic security, a large part of our work is inspired by the Diffie-Helmann's paradigm, which is widely used in cryptography. For each class of systems great care is taken to describe both the attacker's and watermarker's point of view, presenting the challenges raised by each system to these different actors. Finally, we try to outline some research directions which, according to us, deserve further analysis.