메뉴 건너뛰기




Volumn 53, Issue 10 II, 2005, Pages 3976-3987

Watermarking security: Theory and practice

Author keywords

Blind source separation; Equivocation; Fisher information matrix; Security; Watermarking

Indexed keywords

ALGORITHMS; APPROXIMATION THEORY; BLIND SOURCE SEPARATION; CRYPTOGRAPHY; INDEPENDENT COMPONENT ANALYSIS; INFORMATION THEORY; MATHEMATICAL MODELS; MATRIX ALGEBRA; PRINCIPAL COMPONENT ANALYSIS; SECURITY OF DATA; THEOREM PROVING; VECTORS;

EID: 21844463487     PISSN: 1053587X     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSP.2005.855418     Document Type: Review
Times cited : (251)

References (42)
  • 2
    • 0032074148 scopus 로고    scopus 로고
    • "Rotation, scale and translation invariant spread spectrum digital image watermarking"
    • J. O'Ruanaidh and T. Pun, "Rotation, scale and translation invariant spread spectrum digital image watermarking," Signal Process., vol. 66, no. 3, pp. 303-17, 1998.
    • (1998) Signal Process. , vol.66 , Issue.3 , pp. 303-317
    • O'Ruanaidh, J.1    Pun, T.2
  • 3
    • 0000508830 scopus 로고    scopus 로고
    • "Fast robust template matching for affine resistant image watermarks"
    • A. Pfitzmann, Ed. Dresden, Germany: Springer-Verlag
    • S. Pereira and T. Pun, "Fast robust template matching for affine resistant image watermarks," in Proc. IHW. A. Pfitzmann, Ed. Dresden, Germany: Springer-Verlag, 1999, pp. 199-210.
    • (1999) Proc. IHW , pp. 199-210
    • Pereira, S.1    Pun, T.2
  • 4
    • 0032625842 scopus 로고    scopus 로고
    • "Watermarking as communication with side information"
    • Jul
    • I. Cox, M. Miller, and A. McKellips, "Watermarking as communication with side information," Proc. IEEE, vol. 87, no. 7, pp. 1127-1141, Jul. 1999.
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1127-1141
    • Cox, I.1    Miller, M.2    McKellips, A.3
  • 5
    • 0035333687 scopus 로고    scopus 로고
    • "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding"
    • May
    • B. Chen and G. Wornell, "Quantization index modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.2
  • 6
    • 0035369674 scopus 로고    scopus 로고
    • "The role of information theory in watermarking and its application to image watermarking"
    • P. Moulin, "The role of information theory in watermarking and its application to image watermarking," Signal Process., vol. 81, pp. 1121-1139, 2001.
    • (2001) Signal Process. , vol.81 , pp. 1121-1139
    • Moulin, P.1
  • 7
    • 0035790994 scopus 로고    scopus 로고
    • "Considerations on watermarking security"
    • Cannes, France, Oct
    • T. Kalker, "Considerations on watermarking security," in Proc. MMSP, Cannes, France, Oct. 2001, pp. 201-206.
    • (2001) Proc. MMSP , pp. 201-206
    • Kalker, T.1
  • 8
    • 0031340746 scopus 로고    scopus 로고
    • "On the invertibility of invisible watermarking technique"
    • Washington, DC
    • S. Craver, N. Memon, B.-L. Yeo, and M. M. Yeung, "On the invertibility of invisible watermarking technique," in Proc. IEEE ICIP Washington, DC, 1997, pp. 540-543.
    • (1997) Proc. IEEE ICIP , pp. 540-543
    • Craver, S.1    Memon, N.2    Yeo, B.-L.3    Yeung, M.M.4
  • 10
    • 0032075477 scopus 로고    scopus 로고
    • "Some general methods for tampering with watermarks"
    • May
    • I. Cox and J.-P. Linnartz, "Some general methods for tampering with watermarks," IEEE J. Sel. Areas Commun., vol. 16, no. 5, pp. 587-93, May 1998.
    • (1998) IEEE J. Sel. Areas Commun. , vol.16 , Issue.5 , pp. 587-593
    • Cox, I.1    Linnartz, J.-P.2
  • 11
    • 0007751316 scopus 로고    scopus 로고
    • "Analysis of the sensitivity attack against electronic watermarks in images"
    • D. Aucsmith, Ed. Portland, OR: Springer-Verlag, Lecture Notes in Computer Science
    • J. P. Linnartz and M. van Dijk, "Analysis of the sensitivity attack against electronic watermarks in images," in Proc. IHW, D. Aucsmith, Ed. Portland, OR: Springer-Verlag, 1998, vol. 1525, Lecture Notes in Computer Science.
    • (1998) Proc. IHW , vol.1525
    • Linnartz, J.P.1    van Dijk, M.2
  • 12
    • 0002561772 scopus 로고    scopus 로고
    • "An information-theoritic approach to steganography and watermarking"
    • A. Pfitzmann, Ed. Dresden, Germany: Springer-Verlag
    • T. Mittelholzer, "An information-theoritic approach to steganography and watermarking," in Proc. IHW, A. Pfitzmann, Ed. Dresden, Germany: Springer-Verlag, 1999. pp. 1-17.
    • (1999) Proc. IHW , pp. 1-17
    • Mittelholzer, T.1
  • 13
    • 0037851028 scopus 로고    scopus 로고
    • "An asymmetric watermarking method"
    • Apr
    • T. Furon and P. Duhamel, "An asymmetric watermarking method," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 981-995, Apr. 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.4 , pp. 981-995
    • Furon, T.1    Duhamel, P.2
  • 14
    • 0041320695 scopus 로고    scopus 로고
    • "A general framework for robust watermarking security"
    • Oct. to be published
    • M. Barni, F. Bartolini, and T. Furon, "A general framework for robust watermarking security," Signal Process., vol. 83, no. 10, pp. 2069-2084, Oct. 2003, to be published.
    • (2003) Signal Process. , vol.83 , Issue.10 , pp. 2069-2084
    • Barni, M.1    Bartolini, F.2    Furon, T.3
  • 15
    • 0003185688 scopus 로고
    • "La cryptographie militaire"
    • Jan
    • A. Kerckhoffs, "La cryptographie militaire," J. Des Sci. Militaires, vol. 9, pp. 5-38, Jan. 1883.
    • (1883) J. Des Sci. Militaires , vol.9 , pp. 5-38
    • Kerckhoffs, A.1
  • 16
    • 84890522850 scopus 로고
    • "Communication theory of secrecy systems"
    • Oct
    • C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, Oct. 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 17
    • 0017018484 scopus 로고
    • "New directions in cryptography"
    • Nov
    • W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, no. 6, pp. 644-654, Nov. 1976.
    • (1976) IEEE Trans. Inf. Theory , vol.IT-22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 18
    • 0032024437 scopus 로고    scopus 로고
    • "Copyright labeling of digitized image data"
    • Mar
    • S. Burgett, E. Koch, and J. Zhao, "Copyright labeling of digitized image data," IEEE Commun. Mag., vol. 36, no. 3, pp. 94-100, Mar. 1998.
    • (1998) IEEE Commun. Mag. , vol.36 , Issue.3 , pp. 94-100
    • Burgett, S.1    Koch, E.2    Zhao, J.3
  • 19
    • 0021486174 scopus 로고
    • "Cryptology and the origins of spread spectrum"
    • Sep
    • D. Kahn, "Cryptology and the origins of spread spectrum," IEEE Spectrum, vol. 21, pp. 70-80, Sep. 1984.
    • (1984) IEEE Spectrum , vol.21 , pp. 70-80
    • Kahn, D.1
  • 20
    • 0037400124 scopus 로고    scopus 로고
    • "Practical watermarking scheme based on wide spread spectrum and game theory"
    • Apr
    • S. Pateux and G. Le Guelvouit, "Practical watermarking scheme based on wide spread spectrum and game theory," Signal Processing: Image Commun., vol. 18, pp. 283-296, Apr. 2003.
    • (2003) Signal Processing: Image Commun. , vol.18 , pp. 283-296
    • Pateux, S.1    Le Guelvouit, G.2
  • 21
    • 0037737759 scopus 로고    scopus 로고
    • "Scalar costa scheme for information embedding"
    • Apr
    • J. Eggers, R. Baüml, R. Tzschoppe, and B. Girod, "Scalar costa scheme for information embedding," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1003-1019, Apr. 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.4 , pp. 1003-1019
    • Eggers, J.1    Baüml, R.2    Tzschoppe, R.3    Girod, B.4
  • 22
    • 0034441409 scopus 로고    scopus 로고
    • "Informed embedding: Exploiting image and detector information during watermark insertion"
    • Vancouver, BC, Canada, Sep
    • M. Miller, I. Cox, and J. Bloom, "Informed embedding: Exploiting image and detector information during watermark insertion," in Proc. ICIP, Vancouver, BC, Canada, Sep. 2000.
    • (2000) Proc. ICIP
    • Miller, M.1    Cox, I.2    Bloom, J.3
  • 23
    • 0038527410 scopus 로고    scopus 로고
    • "Improved spread spectrum: A new modulation technique for robust watermarking"
    • Apr
    • H. S. Malvar and D. A. F. Florêncio, "Improved spread spectrum: A new modulation technique for robust watermarking," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 868-905, Apr. 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.4 , pp. 868-905
    • Malvar, H.S.1    Florêncio, D.A.F.2
  • 24
    • 0035448026 scopus 로고    scopus 로고
    • "Blind separation of instantaneous mixtures of nonstationary sources"
    • Sep
    • D. T. Pham and J. F. Cardoso, "Blind separation of instantaneous mixtures of nonstationary sources," IEEE Trans. Signal Process., vol. 49, no. 9, pp. 1837-1848, Sep. 2001.
    • (2001) IEEE Trans. Signal Process. , vol.49 , Issue.9 , pp. 1837-1848
    • Pham, D.T.1    Cardoso, J.F.2
  • 25
    • 0035368528 scopus 로고    scopus 로고
    • "Analysis of digital watermarks subjected to optimum linear filtering and additive noise"
    • J. Su, J. Eggers, and B. Girod, "Analysis of digital watermarks subjected to optimum linear filtering and additive noise," Signal Process., vol. 81, pp. 1141-1175, 2001.
    • (2001) Signal Process. , vol.81 , pp. 1141-1175
    • Su, J.1    Eggers, J.2    Girod, B.3
  • 26
    • 0028416938 scopus 로고
    • "Independent component analysis, A new concept?"
    • P. Comon, "Independent component analysis, A new concept?," Signal Process., vol. 36, no. 3, pp. 287-314, 1994.
    • (1994) Signal Process. , vol.36 , Issue.3 , pp. 287-314
    • Comon, P.1
  • 27
    • 0031271273 scopus 로고    scopus 로고
    • "Blind source separation; Semiparametric statistical approach"
    • S.-I. Amari and J. F. Cardoso, "Blind source separation; Semiparametric statistical approach," IEEE Trans. Signal Process., vol. 45, 1997.
    • (1997) IEEE Trans. Signal Process. , vol.45
    • Amari, S.-I.1    Cardoso, J.F.2
  • 28
    • 0032187518 scopus 로고    scopus 로고
    • "Blind signal separation: Statistical principles"
    • Oct
    • J.-F. Cardoso, "Blind signal separation: Statistical principles," Proc. IEEE. vol. 86, no. 10, pp. 2009-2025, Oct. 1998.
    • (1998) Proc. IEEE , vol.86 , Issue.10 , pp. 2009-2025
    • Cardoso, J.-F.1
  • 29
    • 0039132601 scopus 로고    scopus 로고
    • "Blind separation of BPSK sources with residual carders"
    • Jan
    • A.-J. van der Veen, "Blind separation of BPSK sources with residual carders," Signal Process., vol. 73, no. 10, pp. 67-79, Jan. 1999.
    • (1999) Signal Process. , vol.73 , Issue.10 , pp. 67-79
    • van der Veen, A.-J.1
  • 30
    • 0031386464 scopus 로고    scopus 로고
    • "Source separation when the input sources are discrete or have constant modulus"
    • Dec
    • F. Gamboa and E. Gassiat, "Source separation when the input sources are discrete or have constant modulus," IEEE Trans. Signal Process., vol. 45, no. 12, pp. 3062-3072, Dec. 1997.
    • (1997) IEEE Trans. Signal Process. , vol.45 , Issue.12 , pp. 3062-3072
    • Gamboa, F.1    Gassiat, E.2
  • 31
    • 0032123107 scopus 로고    scopus 로고
    • "On the Cramér-Rao bound under parametric constraints"
    • Jul
    • P. Stoica and B. C. Ng, "On the Cramér-Rao bound under parametric constraints," IEEE Signal Process. Lett., vol. 5, no. 7, pp. 177-179, Jul. 1998.
    • (1998) IEEE Signal Process. Lett. , vol.5 , Issue.7 , pp. 177-179
    • Stoica, P.1    Ng, B.C.2
  • 32
    • 17444373859 scopus 로고    scopus 로고
    • "On regularity and idenfifiability of blind source separation under constant-modulus constraints"
    • Apr
    • Y. Yao and G. B. Criannakis, "On regularity and idenfifiability of blind source separation under constant-modulus constraints," IEEE Trans. Signal Process., vol. 53, no. 4, Apr. 2005.
    • (2005) IEEE Trans. Signal Process. , vol.53 , Issue.4
    • Yao, Y.1    Criannakis, G.B.2
  • 33
    • 33746618589 scopus 로고    scopus 로고
    • "Watermarking attack: Security of wss techniques"
    • Seoul, Korea
    • F. Cayre, C. Fontaine, and T. Furon, "Watermarking attack: Security of wss techniques," in Proc. IWDW, Seoul, Korea, 2004.
    • (2004) Proc. IWDW
    • Cayre, F.1    Fontaine, C.2    Furon, T.3
  • 36
    • 21844460192 scopus 로고    scopus 로고
    • "Watermark attack based on blind estimation without priors"
    • Lecture Notes in Computer Science
    • J. Du, C.-H. Lee, H.-K. Lee, and Y. Suh, "Watermark attack based on blind estimation without priors," in Proc. IWDW, Lecture Notes in Computer Science. 2002.
    • (2002) Proc. IWDW
    • Du, J.1    Lee, C.-H.2    Lee, H.-K.3    Suh, Y.4
  • 37
    • 4544241479 scopus 로고    scopus 로고
    • "Danger of low-dimensional watermarking subspaces"
    • Montreal QC, Canada
    • G. Doërr and J.-L. Dugelay, "Danger of low-dimensional watermarking subspaces," in Proc. IEEE ICASSP Montreal, QC, Canada, 2004, vol. 3.
    • (2004) Proc. IEEE ICASSP , vol.3
    • Doërr, G.1    Dugelay, J.-L.2
  • 38
    • 0003266236 scopus 로고    scopus 로고
    • "Performance bounds for blind channel estimation"
    • Englewood Cliffs, NJ: Prentice-Hall
    • P. Stoica and B. Ng, "Performance bounds for blind channel estimation," in Signal Processing Advances in Wireless and Mobile Communications. Englewood Cliffs, NJ: Prentice-Hall, 2001, vol. 1, pp. 41-62.
    • (2001) Signal Processing Advances in Wireless and Mobile Communications , vol.1 , pp. 41-62
    • Stoica, P.1    Ng, B.2
  • 39
    • 0042826822 scopus 로고    scopus 로고
    • "Independent component analysis: A tutorial"
    • A. Hyvärinen and E. Oja, "Independent component analysis: A tutorial," Neural Networks, vol. 13, no. 4-5, pp. 411-430, 2000.
    • (2000) Neural Networks , vol.13 , Issue.4-5 , pp. 411-430
    • Hyvärinen, A.1    Oja, E.2
  • 40
    • 0032629347 scopus 로고    scopus 로고
    • "Fast and robust fixed-point algorithms for independent component analysis"
    • May
    • A. Hyvärinen, "Fast and robust fixed-point algorithms for independent component analysis," IEEE Trans. Neural Networks, vol. 10, no. 3, pp. 626-634, May 1999.
    • (1999) IEEE Trans. Neural Networks , vol.10 , Issue.3 , pp. 626-634
    • Hyvärinen, A.1
  • 41
    • 4143083811 scopus 로고    scopus 로고
    • "Lattice costa schemes using subspace projection for digital watermarking"
    • Aug
    • R. Fischer, R. Tzschoppe, and R. Bäuml, "Lattice costa schemes using subspace projection for digital watermarking," Eur. Trans. Telecommun., vol. 15, no. 4, pp. 351-362, Aug. 2004.
    • (2004) Eur. Trans. Telecommun. , vol.15 , Issue.4 , pp. 351-362
    • Fischer, R.1    Tzschoppe, R.2    Bäuml, R.3
  • 42
    • 0037513460 scopus 로고    scopus 로고
    • "Special issue on signal processing for data hiding in digital media and secure content delivery"
    • Apr
    • A. Akansu, E. Delp, T. Kalker, B. Liu, N. Memon, P. Moulin, and A. Tewfik, "Special issue on signal processing for data hiding in digital media and secure content delivery," IEEE Trans. Signal Process., vol. 51, no. 4, Apr. 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.4
    • Akansu, A.1    Delp, E.2    Kalker, T.3    Liu, B.4    Memon, N.5    Moulin, P.6    Tewfik, A.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.