메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 80-88

Achieving subspace or key security for WOA using natural or circular watermarking

Author keywords

Circular watermarking; Key security; Natural watermarking; Subspace security; Watermarking; WOA

Indexed keywords

BIT ERROR RATE; BLIND SOURCE SEPARATION; CRYPTOGRAPHY; DATA PRIVACY; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA;

EID: 33750916795     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1161366.1161381     Document Type: Conference Paper
Times cited : (25)

References (16)
  • 1
    • 33746638953 scopus 로고    scopus 로고
    • Fundamentals of data hiding security and their application to spread-spectrum analysis
    • Lecture Notes in Computer Science, Barcelona, Spain, June, Springer Verlag
    • Pedro Comesaña, Luis Pérez-Freire, and Fernando Pérez-González. Fundamentals of data hiding security and their application to spread-spectrum analysis. In 7th Information Hiding Workshop, IH05, Lecture Notes in Computer Science, Barcelona, Spain, June 2005, Springer Verlag.
    • (2005) 7th Information Hiding Workshop, IH05
    • Comesaña, P.1    Pérez-Freire, L.2    Pérez-González, F.3
  • 2
    • 0035790994 scopus 로고    scopus 로고
    • Considerations on watermarking security
    • Cannes, France, October
    • T. Kalker. Considerations on watermarking security. In Proc. of MMSP, pages 201-206, Cannes, France, October 2001.
    • (2001) Proc. of MMSP , pp. 201-206
    • Kalker, T.1
  • 5
    • 84994294924 scopus 로고    scopus 로고
    • Information-theoretic analysis of security in side-informed data hiding
    • Lecture Notes in Computer Science, Barcelona, Spain, June. Springer Verlag
    • Luis Pérez-Freire, Pedro Comesaña, and Fernando Pérez-González, Information-theoretic analysis of security in side-informed data hiding. In 7th Information Hiding Workshop, IH05, Lecture Notes in Computer Science, Barcelona, Spain, June 2005. Springer Verlag.
    • (2005) 7th Information Hiding Workshop, IH05
    • Pérez-Freire, L.1    Comesaña, P.2    Pérez-González, F.3
  • 8
    • 0032629347 scopus 로고    scopus 로고
    • Fast and robust fixed-point algorithms for independent component analysis
    • A. Hyvärinen. Fast and robust fixed-point algorithms for independent component analysis. IEEE Transactions on Neural Networks, 10(3):626-634, 1999.
    • (1999) IEEE Transactions on Neural Networks , vol.10 , Issue.3 , pp. 626-634
    • Hyvärinen, A.1
  • 9
    • 0002719797 scopus 로고
    • The Hungarian method of solving the assignment problem
    • Kuhn, H. W. The Hungarian method of solving the assignment problem. Naval Res. Logistics Quart., 2:83-97, 1955.
    • (1955) Naval Res. Logistics Quart. , vol.2 , pp. 83-97
    • Kuhn, H.W.1
  • 10
    • 0038527410 scopus 로고    scopus 로고
    • Improved spread spectrum: A new modulation technique for robust watermarking
    • Malvar and Florencio. Improved spread spectrum: A new modulation technique for robust watermarking. IEEE Transactions on Signal Processing, 51, 2003.
    • (2003) IEEE Transactions on Signal Processing , pp. 51
    • Malvar1    Florencio2
  • 11
    • 38849168937 scopus 로고    scopus 로고
    • Natural watermarking: A secure spread spectrum technique for woa
    • Neil F. Johnson, editor, Lecture notes in computer science, Virginia, USA, Springer Verlag, Berlin, Germany
    • P. Bas and F. Cayre. Natural watermarking: a secure spread spectrum technique for woa. In Neil F. Johnson, editor, Information Hiding; 8th international workshop, Lecture notes in computer science, Virginia, USA, 2006, Springer Verlag, Berlin, Germany.
    • (2006) Information Hiding; 8th International Workshop
    • Bas, P.1    Cayre, F.2
  • 14
    • 0004285345 scopus 로고
    • The Art of Computer Programming. Addison-Wesley, Reading, Mass., 2nd ed.
    • Donald E. Knuth. The Art of Computer Programming. Vol. 2: Seminumerical Algorithms. Addison-Wesley, Reading, Mass., 1988, 2nd ed.
    • (1988) Seminumerical Algorithms , vol.2
    • Knuth, D.E.1
  • 15
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • may
    • Brian Chen and Gregory W. Wornell. Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. In IEEE Transaction on information theory, Vol. 47, N. 4, pages 1423-1443, may 2001.
    • (2001) IEEE Transaction on Information Theory, Vol. 47, N. 4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 16
    • 2942568431 scopus 로고    scopus 로고
    • Applying informed coding and embedding to design a robust, high capacity watermark
    • M. L. Miller, G. J. Doerr, and I. J. Cox. Applying informed coding and embedding to design a robust, high capacity watermark. IEEE Trans. on Image Processing, 6(13):791-807, 2004.
    • (2004) IEEE Trans. on Image Processing , vol.6 , Issue.13 , pp. 791-807
    • Miller, M.L.1    Doerr, G.J.2    Cox, I.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.