Elements of information theory
Elements of information theory
A general framework for robust watermarking security
Signal Processing - Special section: Security of data hiding technologies
Fundamentals of data hiding security and their application to spread-spectrum analysis
IH'05 Proceedings of the 7th international conference on Information Hiding
Scalar Costa scheme for information embedding
IEEE Transactions on Signal Processing
Watermarking security: theory and practice
IEEE Transactions on Signal Processing - Part II
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Achieving 1/2 log (1+SNR) on the AWGN channel with lattice encoding and decoding
IEEE Transactions on Information Theory
Practical security analysis of dirty paper trellis watermarking
IH'07 Proceedings of the 9th international conference on Information hiding
Hi-index | 0.00 |
This paper presents a theoretical security analysis of lattice data hiding. The security depends on the secrecy of a dither signal that randomizes the codebook. If the same secret dither is used for watermarking multiple objects, an attacker can exploit the information leakage inherent to the lattice data hiding scheme in order to compute an estimate of the dither. Our analysis is aimed at measuring in an information-theoretic sense the amount of information that leaks from each watermarked signal, emphasizing the role of the embedding lattice on the achievable security level. The information leakage determines in a natural way the lowest dither estimation error attainable, which can be taken into account for design criteria. A comparison with spread spectrum methods in terms of security is also given.