메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 1868-1872

A theoretical study of watermarking security

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTANALYSIS; SECRET KEYS; SECURITY LEVELS; WATERMARKING SECURITY;

EID: 33749441311     PISSN: 21578099     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2005.1523669     Document Type: Conference Paper
Times cited : (3)

References (29)
  • 2
    • 0031271273 scopus 로고    scopus 로고
    • Blind source separation; semiparametric statistical approach
    • Special issue on neural networks
    • S.-I. Amari and J.F. Cardoso. Blind source separation; semiparametric statistical approach. IEEE Trans. Signal Processing, 45(11), 1997. Special issue on neural networks.
    • (1997) IEEE Trans. Signal Processing , vol.45 , Issue.11
    • Amari, S.-I.1    Cardoso, J.F.2
  • 3
    • 0041320695 scopus 로고    scopus 로고
    • A general framework for robust watermarking security
    • October Special issue on Security of Data Hiding Technologies, invited paper
    • M. Barni, F. Bartolini, and T. Furon. A general framework for robust watermarking security. Signal Processing, 83(10):2069-2084, October 2003. Special issue on Security of Data Hiding Technologies, invited paper.
    • (2003) Signal Processing , vol.83 , Issue.10 , pp. 2069-2084
    • Barni, M.1    Bartolini, F.2    Furon, T.3
  • 4
    • 0032024437 scopus 로고    scopus 로고
    • Copyright labelling of digitized image data
    • March
    • S. Burgett, E. Koch, and J. Zhao. Copyright labelling of digitized image data. IEEE Commun. Mag., 36(3):94-100, March 1998.
    • (1998) IEEE Commun. Mag. , vol.36 , Issue.3 , pp. 94-100
    • Burgett, S.1    Koch, E.2    Zhao, J.3
  • 5
    • 0032187518 scopus 로고    scopus 로고
    • Blind signal separation: Statistical principles
    • October
    • J.-F. Cardoso. Blind signal separation: statistical principles. Proc. IEEE, 86(10):2009-2025, October 1998.
    • (1998) Proc. IEEE , vol.86 , Issue.10 , pp. 2009-2025
    • Cardoso, J.-F.1
  • 6
    • 33749443954 scopus 로고    scopus 로고
    • Watermarking attack: Security of WSS techniques
    • Lecture Notes in Computer Science. Springer-Verlag, to appear, Best Paper Award
    • F. Cayre, C. Fontaine, and T. Furon. Watermarking attack: Security of WSS techniques. In International Workshop on Digital Watermarking - IWDW 2004, Lecture Notes in Computer Science. Springer-Verlag, 2004. to appear, Best Paper Award.
    • (2004) International Workshop on Digital Watermarking - IWDW 2004
    • Cayre, F.1    Fontaine, C.2    Furon, T.3
  • 7
    • 21844463487 scopus 로고    scopus 로고
    • Watermarking security: Theory and practice
    • special issue "Supplement on Secure Media"
    • F. Cayre, C. Fontaine, and T. Furon. Watermarking security: Theory and practice. IEEE Transactions on Signal Processing, 2005. special issue "Supplement on Secure Media".
    • (2005) IEEE Transactions on Signal Processing
    • Cayre, F.1    Fontaine, C.2    Furon, T.3
  • 8
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • May
    • B. Chen and G. Wornell. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inform. Theory, 47:1423-1443, May 2001.
    • (2001) IEEE Trans. Inform. Theory , vol.47 , pp. 1423-1443
    • Chen, B.1    Wornell, G.2
  • 9
    • 0032075477 scopus 로고    scopus 로고
    • Some general methods for tampering with watermarks
    • May Special issue on copyright and privacy protection
    • I. Cox and J.-P. Linnartz. Some general methods for tampering with watermarks. IEEE J. Select. Areas Commun., 16(4):587-93, May 1998. Special issue on copyright and privacy protection.
    • (1998) IEEE J. Select. Areas Commun. , vol.16 , Issue.4 , pp. 587-593
    • Cox, I.1    Linnartz, J.-P.2
  • 10
    • 0031340746 scopus 로고    scopus 로고
    • On the invertibility of invisible watermarking technique
    • Washington, DC, USA, October IEEE
    • S. Craver, N. Memon, B.-L. Yeo, and M.M. Yeung. On the invertibility of invisible watermarking technique. In Proc. ICIP, pages 540-543, Washington, DC, USA, October 1997. IEEE.
    • (1997) Proc. ICIP , pp. 540-543
    • Craver, S.1    Memon, N.2    Yeo, B.-L.3    Yeung, M.M.4
  • 11
    • 0017018484 scopus 로고
    • New directions in cryptography
    • November
    • W. Diffie and M. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, 22(6):644-54, November 1976.
    • (1976) IEEE Trans. Inform. Theory , vol.22 , Issue.6 , pp. 644-654
    • Diffie, W.1    Hellman, M.2
  • 12
    • 4143083811 scopus 로고    scopus 로고
    • Lattice costa schemes using subspace projection for digital watermarking
    • August
    • R. Fischer, R. Tzschoppe, and R. Bäuml. Lattice costa schemes using subspace projection for digital watermarking. European Trans. Telecommunications, 15(4):351-362, August 2004.
    • (2004) European Trans. Telecommunications , vol.15 , Issue.4 , pp. 351-362
    • Fischer, R.1    Tzschoppe, R.2    Bäuml, R.3
  • 14
    • 33747644069 scopus 로고    scopus 로고
    • Source separation when the input sources are discrete or have constant modulus
    • December
    • F. Gamboa and E. Gassiat. Source separation when the input sources are discrete or have constant modulus. IEEE Trans. Signal Processing, 45(12):3062-3072, December 1997.
    • (1997) IEEE Trans. Signal Processing , vol.45 , Issue.12 , pp. 3062-3072
    • Gamboa, F.1    Gassiat, E.2
  • 16
    • 0035790994 scopus 로고    scopus 로고
    • Considerations on watermarking security
    • Cannes, France, October
    • T. Kalker. Considerations on watermarking security. In Proc. MMSP, pages 201-206, Cannes, France, October 2001.
    • (2001) Proc. MMSP , pp. 201-206
    • Kalker, T.1
  • 19
    • 0007751316 scopus 로고    scopus 로고
    • Analysis of the sensitivity attack against electronic watermarks in images
    • D. Aucsmith, editor, Proc. IHW, Portland, Oregon, USA, April Springer Verlag
    • J.P. Linnartz and M. van Dijk. Analysis of the sensitivity attack against electronic watermarks in images. In D. Aucsmith, editor, Proc. IHW, volume 1525 of Lecture Notes in Computer Science, Portland, Oregon, USA, April 1998. Springer Verlag.
    • (1998) Lecture Notes in Computer Science , vol.1525
    • Linnartz, J.P.1    Van Dijk, M.2
  • 21
    • 0034441409 scopus 로고    scopus 로고
    • Informed embedding: Exploiting image and detector information during watermark insertion
    • Vancouver, Canada, September
    • M. Miller, I. Cox, and J. Bloom. Informed embedding: exploiting image and detector information during watermark insertion. In Proc. ICIP, Vancouver, Canada, September 2000.
    • (2000) Proc. ICIP
    • Miller, M.1    Cox, I.2    Bloom, J.3
  • 22
    • 0002561772 scopus 로고    scopus 로고
    • An information-theoritic approach to steganography and watermarking
    • A. Pfitzmann, editor, Dresden, Germany, September Springer Verlag
    • T. Mittelholzer. An information-theoritic approach to steganography and watermarking. In A. Pfitzmann, editor, Proc. IHW, pages 1-17, Dresden, Germany, September 1999. Springer Verlag.
    • (1999) Proc. IHW , pp. 1-17
    • Mittelholzer, T.1
  • 23
    • 0035369674 scopus 로고    scopus 로고
    • The role of information theory in watermarking and its application to image watermarking
    • P. Moulin. The role of information theory in watermarking and its application to image watermarking. Signal Processing, 81:1121-1139, 2001.
    • (2001) Signal Processing , vol.81 , pp. 1121-1139
    • Moulin, P.1
  • 24
    • 0037400124 scopus 로고    scopus 로고
    • Practical watermarking scheme based on wide spread spectrum and game theory
    • April
    • S. Pateux and G. Le Guelvouit. Practical watermarking scheme based on wide spread spectrum and game theory. Signal Processing: Image Communication, 18:283-296, April 2003.
    • (2003) Signal Processing: Image Communication , vol.18 , pp. 283-296
    • Pateux, S.1    Le Guelvouit, G.2
  • 25
    • 0035448026 scopus 로고    scopus 로고
    • Blind separation of instantaneous mixtures of non stationary sources
    • D.T. Pham and J.F. Cardoso. Blind separation of instantaneous mixtures of non stationary sources. IEEE Trans. Signal Processing, 49(9): 1837-1848, 2001.
    • (2001) IEEE Trans. Signal Processing , vol.49 , Issue.9 , pp. 1837-1848
    • Pham, D.T.1    Cardoso, J.F.2
  • 26
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • October
    • C.E. Shannon. Communication theory of secrecy systems. Bell system technical journal, 28:656-715, October 1949.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 27
    • 0032123107 scopus 로고    scopus 로고
    • On the Cramr-Rao bound under parametric constraints
    • P. Stoica and B.C. Ng. On the Cramr-Rao bound under parametric constraints. IEEE Signal Processing Lett., 5(7): 177-179, 1998.
    • (1998) IEEE Signal Processing Lett. , vol.5 , Issue.7 , pp. 177-179
    • Stoica, P.1    Ng, B.C.2
  • 28
    • 0039132601 scopus 로고    scopus 로고
    • Blind separation of BPSK sources with residual carriers
    • January
    • A.-J. van der Veen. Blind separation of BPSK sources with residual carriers. Signal Processing, 73(10):67-79, January 1999.
    • (1999) Signal Processing , vol.73 , Issue.10 , pp. 67-79
    • Van Der Veen, A.-J.1
  • 29
    • 4544366059 scopus 로고    scopus 로고
    • On regularity and identifiability of blind source separation under constant-modulus constraints
    • To appear
    • Y. Yao and G.B. Giannakis. On regularity and identifiability of blind source separation under constant-modulus constraints. IEEE Trans. Signal Processing, 2004. To appear.
    • (2004) IEEE Trans. Signal Processing
    • Yao, Y.1    Giannakis, G.B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.