A fast fixed-point algorithm for independent component analysis
Neural Computation
DCT-based watermark recovering without resorting to the uncorrupted original image
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Achieving subspace or key security for WOA using natural or circular watermarking
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Natural watermarking: a secure spread spectrum technique for WOA
IH'06 Proceedings of the 8th international conference on Information hiding
Practical security analysis of dirty paper trellis watermarking
IH'07 Proceedings of the 9th international conference on Information hiding
Watermarking attack: security of WSS techniques
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Improved spread spectrum: a new modulation technique for robust watermarking
IEEE Transactions on Signal Processing
Watermarking security: theory and practice
IEEE Transactions on Signal Processing - Part II
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Towards robust and secure watermarking
Proceedings of the 12th ACM workshop on Multimedia and security
Hi-index | 0.00 |
This paper presents the first practical analysis of secure modulations for watermarking of still images in the case of a WOA (Watermarked Only Attack) attack framework (the attacker observes only marked contents). Two recent spread spectrum modulations, namely Natural Watermarking (NW) and Circular Watermarking (CW) are compared against classical modulations, namely Spread Spectrum (SS) and Improved Spread Spectrum (ISS). Results are discussed from the distorsion point of view, as well as from the the robustness and security point of view. We emphasize that the experiments were carried out on a rather significant number of images (2000) and demonstrate the relevance of these modulations in a real-world application.