메뉴 건너뛰기




Volumn 4300 LNCS, Issue , 2006, Pages 41-72

Watermarking security: A survey

Author keywords

[No Author keywords available]

Indexed keywords

ENGINEERING RESEARCH; PROBLEM SOLVING; SECURITY OF DATA;

EID: 36549070448     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11926214_2     Document Type: Conference Paper
Times cited : (61)

References (132)
  • 2
    • 33646202789 scopus 로고    scopus 로고
    • Special session: Watermarking security
    • Edward J. Wong, DeLp III, P.W, eds, San Jose, California, USA, SPIE
    • Barni, M., Pérez-González, F.: Special session: watermarking security. In Edward J. DeLp III, Wong, P.W., eds.: Security, Steganography, and Watermarking of Multimedia Contents VII. Volume 5681., San Jose, California, USA, SPIE (2005) 685-768
    • (2005) Security, Steganography, and Watermarking of Multimedia Contents VII , vol.5681 , pp. 685-768
    • Barni, M.1    Pérez-González, F.2
  • 4
    • 38549142205 scopus 로고    scopus 로고
    • Special session on watermarking security
    • Barni, M, Cox, I, Kalker, T, Kim, H.J, eds, Siena, Italy, Springer
    • Pérez-González, F., Furon, T.: Special session on watermarking security. In Barni, M., Cox, I., Kalker, T., Kim, H.J., eds.: Fourth International Workshop on Digital Watermarking. Volume 3710., Siena, Italy, Springer (2005) 201-274
    • (2005) Fourth International Workshop on Digital Watermarking , vol.3710 , pp. 201-274
    • Pérez-González, F.1    Furon, T.2
  • 9
    • 33646195486 scopus 로고    scopus 로고
    • A survey of watermarking security
    • Barni, M, ed, Proc. of Int. Work. on Digital Watermarking. of, Siena, Italy, Springer-Verlag
    • Furon, T.: A survey of watermarking security. In Barni, M., ed.: Proc. of Int. Work. on Digital Watermarking. Volume 3710 of Lecture Notes on Computer Science., Siena, Italy, Springer-Verlag (2005) 201-215
    • (2005) Lecture Notes on Computer Science , vol.3710 , pp. 201-215
    • Furon, T.1
  • 14
    • 0032073388 scopus 로고    scopus 로고
    • Performance analysis of a 2d-multipulse amplitude modulation scheme for data hiding and watermarking of still images
    • Hernández, J.R., Pérez-González, F., Rodríguez, J.M., Nieto, G.: Performance analysis of a 2d-multipulse amplitude modulation scheme for data hiding and watermarking of still images. IEEE J. Select. Areas Commun. 16 (1998) 510-524
    • (1998) IEEE J. Select. Areas Commun , vol.16 , pp. 510-524
    • Hernández, J.R.1    Pérez-González, F.2    Rodríguez, J.M.3    Nieto, G.4
  • 15
    • 0031335088 scopus 로고    scopus 로고
    • Fast public-key watermarking of compressed video
    • Santa Barbara, California, USA
    • Hartung, F., Girod, B.: Fast public-key watermarking of compressed video. In: Proc. IEEE ICIP'97. Volume I., Santa Barbara, California, USA (1997) 528-531
    • (1997) Proc. IEEE ICIP'97 , vol.1 , pp. 528-531
    • Hartung, F.1    Girod, B.2
  • 16
  • 18
  • 19
    • 0042322192 scopus 로고    scopus 로고
    • Protection of wavelet-based watermarking systems using filter parametrization
    • Dietl, W., Meerwald, P., Uhl, A.: Protection of wavelet-based watermarking systems using filter parametrization. Elsevier Signal Processing 83 (2003) 2095-2116
    • (2003) Elsevier Signal Processing , vol.83 , pp. 2095-2116
    • Dietl, W.1    Meerwald, P.2    Uhl, A.3
  • 20
    • 0035158798 scopus 로고    scopus 로고
    • Seo, Y., Kim, M., Park, H., Jung, H., Chung, H., Huh, Y., Lee, J., Center, V., ETRI, T.: A secure watermarking for JPEG-2000. In: Proc. IEEE Int. Conf. Image Processing. 2., Thessaloniki, Greece (2001) 530-533
    • Seo, Y., Kim, M., Park, H., Jung, H., Chung, H., Huh, Y., Lee, J., Center, V., ETRI, T.: A secure watermarking for JPEG-2000. In: Proc. IEEE Int. Conf. Image Processing. Volume 2., Thessaloniki, Greece (2001) 530-533
  • 21
    • 0036474718 scopus 로고    scopus 로고
    • A wavelet-based watermarking algorithm for ownership verificationof digital images
    • Wang, Y., Doherty, J., Dyck, R.V.: A wavelet-based watermarking algorithm for ownership verificationof digital images. IEEE Trans. on Image Processing 11 (2002) 77-88
    • (2002) IEEE Trans. on Image Processing , vol.11 , pp. 77-88
    • Wang, Y.1    Doherty, J.2    Dyck, R.V.3
  • 22
    • 0031378592 scopus 로고    scopus 로고
    • An invisible watermarking technique for image verification
    • Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: Proc. IEEE Int. Conf. Image Processing. Volume 2. (1997) 680-683
    • (1997) Proc. IEEE Int. Conf. Image Processing , vol.2 , pp. 680-683
    • Yeung, M.1    Mintzer, F.2
  • 23
    • 0036999125 scopus 로고    scopus 로고
    • Power-spectrum condition for energy-efficient watermarking. Multimedia
    • Su, J., Girod, B.: Power-spectrum condition for energy-efficient watermarking. Multimedia, IEEE Transactions on 4 (2002) 551-560
    • (2002) IEEE Transactions on , vol.4 , pp. 551-560
    • Su, J.1    Girod, B.2
  • 24
    • 0032296690 scopus 로고    scopus 로고
    • Chaotic watermarks for embedding in the spatial digital image domain
    • Chicago, IL, USA
    • Voyatzis, G., Pitas, I.: Chaotic watermarks for embedding in the spatial digital image domain. In: Proc. IEEE Int. Conf. Image Processing. Volume 2., Chicago, IL, USA (1998) 432-436
    • (1998) Proc. IEEE Int. Conf. Image Processing , vol.2 , pp. 432-436
    • Voyatzis, G.1    Pitas, I.2
  • 25
    • 0030386584 scopus 로고    scopus 로고
    • Applications of toral automorphisms in image watermarking
    • Laussane, Switzerland
    • Voyatzis, G., Pitas, I.: Applications of toral automorphisms in image watermarking. In: Proc. IEEE Int. Conf. Image Processing. Volume 2., Laussane, Switzerland (1996) 237-240
    • (1996) Proc. IEEE Int. Conf. Image Processing , vol.2 , pp. 237-240
    • Voyatzis, G.1    Pitas, I.2
  • 26
    • 0038527410 scopus 로고    scopus 로고
    • Improved spread spectrum: A new modulation technique for robust watermarking
    • Malvar, H.S., Florencio, D.A.F.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing 51 (2003) 898-905
    • (2003) IEEE Transactions on Signal Processing , vol.51 , pp. 898-905
    • Malvar, H.S.1    Florencio, D.A.F.2
  • 27
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • Chen, B., Wornell, G.W.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. on Information Theory 47 (2001) 1423-1443
    • (2001) IEEE Trans. on Information Theory , vol.47 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 28
    • 0037737759 scopus 로고    scopus 로고
    • Scalar Costa Scheme for information embedding
    • Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery
    • Eggers, J.J., Bäuml, R., Tzschoppe, R., Girod, B.: Scalar Costa Scheme for information embedding. IEEE Transactions on Signal Processing 51 (2003) 1003-1019 Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery.
    • (2003) IEEE Transactions on Signal Processing , vol.51 , pp. 1003-1019
    • Eggers, J.J.1    Bäuml, R.2    Tzschoppe, R.3    Girod, B.4
  • 30
    • 21844445258 scopus 로고    scopus 로고
    • Rational Dither Modulation: A high-rate data-hiding method robust to gain attacks
    • Third supplement on secure media
    • Pérez-González, F., Mosquera, C., Barni, M., Abrardo, A.: Rational Dither Modulation: a high-rate data-hiding method robust to gain attacks. IEEE Trans. on Signal Processing 53 (2005) 3960-3975 Third supplement on secure media.
    • (2005) IEEE Trans. on Signal Processing , vol.53 , pp. 3960-3975
    • Pérez-González, F.1    Mosquera, C.2    Barni, M.3    Abrardo, A.4
  • 31
    • 33749606410 scopus 로고    scopus 로고
    • Minmax strategies for QIM watermarking subject to attacks with memory
    • Genova, Italy
    • Moulin, P., Goteti, A.K.: Minmax strategies for QIM watermarking subject to attacks with memory. In: IEEE International Conference on Image Processing, ICIP 2005. Volume 1., Genova, Italy (2005) 985-988
    • (2005) IEEE International Conference on Image Processing, ICIP , vol.1 , pp. 985-988
    • Moulin, P.1    Goteti, A.K.2
  • 33
    • 2942568431 scopus 로고    scopus 로고
    • Applying informed coding and embedding to design a robust high-capacity watermarking
    • Miller, M.L., Doërr, G.J., Cox, I.J.: Applying informed coding and embedding to design a robust high-capacity watermarking. IEEE Transactions on Image Processing 13 (2004) 792-807
    • (2004) IEEE Transactions on Image Processing , vol.13 , pp. 792-807
    • Miller, M.L.1    Doërr, G.J.2    Cox, I.J.3
  • 34
    • 84957018842 scopus 로고    scopus 로고
    • Low cost attacks on tamper resistant devices
    • International Workshop on Security Protocols. of, Paris, France, Springer Verlag
    • Anderson, R., Kuhn, M.: Low cost attacks on tamper resistant devices. In: International Workshop on Security Protocols. Volume 1361 of Lecture Notes in Computer Science., Paris, France, Springer Verlag (1997) 125-136
    • (1997) Lecture Notes in Computer Science , vol.1361 , pp. 125-136
    • Anderson, R.1    Kuhn, M.2
  • 35
    • 84944404911 scopus 로고    scopus 로고
    • Zero-knowledge watermark detection and proof of ownership
    • Information Hiding, Fourth International Workshop. of, Springer
    • Adelsbach, A., Sadeghi, A.R.: Zero-knowledge watermark detection and proof of ownership. In: Information Hiding, Fourth International Workshop. Volume 2137 of Lecture Notes in Computer Science., Springer (2001) 273-288
    • (2001) Lecture Notes in Computer Science , vol.2137 , pp. 273-288
    • Adelsbach, A.1    Sadeghi, A.R.2
  • 37
    • 0003434530 scopus 로고    scopus 로고
    • Resistance of watermarked documents to collusional attacks
    • Technical report, NEC Research Institute, Princeton, NJ
    • Killian, J., Leighton, F.T., Matheson, L.R., Shamoon, T., Tarjan, R.E.: Resistance of watermarked documents to collusional attacks. Technical report, NEC Research Institute, Princeton, NJ (1997)
    • (1997)
    • Killian, J.1    Leighton, F.T.2    Matheson, L.R.3    Shamoon, T.4    Tarjan, R.E.5
  • 38
    • 0003302360 scopus 로고    scopus 로고
    • Public watermarks and resistance to tampering
    • Santa Barbara, California, USA
    • Cox, L.J., Linnartz, J.P.M.G.: Public watermarks and resistance to tampering. In: Proc. IEEE Int. Conf. on Image Processing. Volume 3., Santa Barbara, California, USA (1997) 3-6
    • (1997) Proc. IEEE Int. Conf. on Image Processing , vol.3 , pp. 3-6
    • Cox, L.J.1    Linnartz, J.P.M.G.2
  • 39
    • 84947902426 scopus 로고    scopus 로고
    • An information-theoretic approach to steganography and watermarking
    • Pfitzmann, A, ed, 3rd Int. Workshop on Information Hiding, IH'99. of, Dresden, Germany, Springer Verlag
    • Mitthelholzer, T.: An information-theoretic approach to steganography and watermarking. In Pfitzmann, A., ed.: 3rd Int. Workshop on Information Hiding, IH'99. Volume 1768 of Lecture Notes in Computer Science., Dresden, Germany, Springer Verlag (1999) 1-17
    • (1999) Lecture Notes in Computer Science , vol.1768 , pp. 1-17
    • Mitthelholzer, T.1
  • 40
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • Aucsmith, D, ed, 2nd Int. Workshop on Information Hiding, IH'98. of, Portland, OR, USA, Springer Verlag
    • Cachin, C.: An information-theoretic model for steganography. In Aucsmith, D., ed.: 2nd Int. Workshop on Information Hiding, IH'98. Volume 1525 of Lecture Notes in Computer Science., Portland, OR, USA, Springer Verlag (1998) 306-318
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 306-318
    • Cachin, C.1
  • 41
    • 84957886335 scopus 로고    scopus 로고
    • Modeling the security of steganographic systems
    • Aucsmith, D, ed, Information Hiding International Workshop. of, Portland, OR, USA, Springer
    • Zöllner, J., Federrath, H., Klimant, H., Pfitzmann, A., Piotraschke, R., Westfeld, A., Wicke, G., Wolf, G.: Modeling the security of steganographic systems. In Aucsmith, D., ed.: Information Hiding International Workshop. Volume 1525 of Lecture Notes in Computer Science., Portland, OR, USA, Springer (1998) 344-354
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 344-354
    • Zöllner, J.1    Federrath, H.2    Klimant, H.3    Pfitzmann, A.4    Piotraschke, R.5    Westfeld, A.6    Wicke, G.7    Wolf, G.8
  • 42
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon, C.E.: Communication theory of secrecy systems. Bell system technical journal 28 (1949) 656-715
    • (1949) Bell system technical journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 44
    • 38549142193 scopus 로고    scopus 로고
    • Furon, T., et al.: Security Analysis. European Project IST-1999-10987 CERTI-MARK, Deliverable D.5.5 (2002)
    • Furon, T., et al.: Security Analysis. European Project IST-1999-10987 CERTI-MARK, Deliverable D.5.5 (2002)
  • 47
    • 0041320695 scopus 로고    scopus 로고
    • A general framework for robust watermarking security
    • Special issue on Security of Data Hiding Technologies, invited paper
    • Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Signal Processing 83 (2003) 2069-2084 Special issue on Security of Data Hiding Technologies, invited paper.
    • (2003) Signal Processing , vol.83 , pp. 2069-2084
    • Barni, M.1    Bartolini, F.2    Furon, T.3
  • 50
  • 52
    • 33746628959 scopus 로고    scopus 로고
    • Fundamentals of data hiding security and their application to spread-spectrum analysis
    • 7th Information Hiding Workshop, IH05, Barcelona, Spain, Springer Verlag
    • Comesaña, P., Pérez-Freire, L., Pérez- González, F.: Fundamentals of data hiding security and their application to spread-spectrum analysis. In: 7th Information Hiding Workshop, IH05. Lecture Notes in Computer Science, Barcelona, Spain, Springer Verlag (2005) 146-160
    • (2005) Lecture Notes in Computer Science , pp. 146-160
    • Comesaña, P.1    Pérez-Freire, L.2    Pérez- González, F.3
  • 53
    • 33746637553 scopus 로고    scopus 로고
    • Information-theoretic analysis of security in side-informed data hiding
    • 7th Information Hiding Workshop, IH05, Barcelona, Spain, Springer Verlag
    • Pérez-Freire, L., Comesaña, P., Pérez- González, F.: Information-theoretic analysis of security in side-informed data hiding. In: 7th Information Hiding Workshop, IH05. Lecture Notes in Computer Science, Barcelona, Spain, Springer Verlag (2005) 131-145
    • (2005) Lecture Notes in Computer Science , pp. 131-145
    • Pérez-Freire, L.1    Comesaña, P.2    Pérez- González, F.3
  • 56
    • 84957877087 scopus 로고    scopus 로고
    • Shedding more light on image watermarks
    • Aucsmith, D, ed, 2nd Int. Workshop on Information Hiding, IH'98. of, Portland, OR, USA, Springer Verlag
    • Hernández, J.R., Pérez-González, F.: Shedding more light on image watermarks. In Aucsmith, D., ed.: 2nd Int. Workshop on Information Hiding, IH'98. Volume 1525 of Lecture Notes in Computer Science., Portland, OR, USA, Springer Verlag (1998) 191-207
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 191-207
    • Hernández, J.R.1    Pérez-González, F.2
  • 57
    • 4744367575 scopus 로고    scopus 로고
    • Doërr, G., Dugelay, J.L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Trans. Sig. Proc., Supplement on Secure Media 52 (2004) 2955-2964
    • Doërr, G., Dugelay, J.L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Trans. Sig. Proc., Supplement on Secure Media 52 (2004) 2955-2964
  • 60
    • 17644366813 scopus 로고    scopus 로고
    • Mutual information and minimum mean-square error in Gaussian channels
    • Guo, D., Shamai, S., Verdú, S.: Mutual information and minimum mean-square error in Gaussian channels. IEEE Transactions on Information Theory 51 (2005) 1261-1282
    • (2005) IEEE Transactions on Information Theory , vol.51 , pp. 1261-1282
    • Guo, D.1    Shamai, S.2    Verdú, S.3
  • 61
    • 84872524343 scopus 로고    scopus 로고
    • Additive non-Gaussian noise channels: Mutual information and conditional mean estimation
    • ISIT, Adelaide, Australia
    • Guo, D., Shamai, S., Verdú, S.: Additive non-Gaussian noise channels: Mutual information and conditional mean estimation. In: IEEE International Symposium on Information Theory (ISIT), Adelaide, Australia (2005) 719-723
    • (2005) IEEE International Symposium on Information Theory , pp. 719-723
    • Guo, D.1    Shamai, S.2    Verdú, S.3
  • 62
    • 33144485285 scopus 로고    scopus 로고
    • Gradient of mutual information in linear vector Gaussian channels
    • Palomar, D.P., Verdú, S.: Gradient of mutual information in linear vector Gaussian channels. IEEE Transactions on Information Theory 52 (2006) 141-154
    • (2006) IEEE Transactions on Information Theory , vol.52 , pp. 141-154
    • Palomar, D.P.1    Verdú, S.2
  • 63
    • 38549142202 scopus 로고    scopus 로고
    • P.Bas, Cayre, F.: Natural Watermarking: a secure spread spectrum technique for WOA. In: 8th Information Hiding Workshop, IH06. Lecture Notes in Computer Science, Old Town Alexandria, Virginia, USA, Springer Verlag (2006)
    • P.Bas, Cayre, F.: Natural Watermarking: a secure spread spectrum technique for WOA. In: 8th Information Hiding Workshop, IH06. Lecture Notes in Computer Science, Old Town Alexandria, Virginia, USA, Springer Verlag (2006)
  • 67
    • 38549143496 scopus 로고    scopus 로고
    • Conway, J., Sloane, N.: Sphere Packings, Lattices and Groups. 3rd edn. 290 of Comprehensive Studies in Mathematics. Springer (1999)
    • Conway, J., Sloane, N.: Sphere Packings, Lattices and Groups. 3rd edn. Volume 290 of Comprehensive Studies in Mathematics. Springer (1999)
  • 70
    • 0036999125 scopus 로고    scopus 로고
    • Power-spectrum condition for energy-efficient watermarking
    • Su, J., Girod, B.: Power-spectrum condition for energy-efficient watermarking. IEEE Transactions on Multimedia 4 (2002) 551-560
    • (2002) IEEE Transactions on Multimedia , vol.4 , pp. 551-560
    • Su, J.1    Girod, B.2
  • 73
    • 0042826822 scopus 로고    scopus 로고
    • Independent component analysis: Algorithms and applications
    • Hyvärinen, A., Oja, E.: Independent component analysis: Algorithms and applications. Neural Networks 13 (2000) 411-430
    • (2000) Neural Networks , vol.13 , pp. 411-430
    • Hyvärinen, A.1    Oja, E.2
  • 74
    • 33746618589 scopus 로고    scopus 로고
    • Watermarking security: Application to a WSS technique for still images
    • Cox, I.J, Kalker, T, Lee, H, eds, Seoul, Korea, Springer
    • Cayre, F., Fontaine, C., Furon, T.: Watermarking security: application to a WSS technique for still images. In Cox, I.J., Kalker, T., Lee, H., eds.: Third International Workshop on Digital Watermarking. Volume 3304., Seoul, Korea, Springer (2004)
    • (2004) Third International Workshop on Digital Watermarking , vol.3304
    • Cayre, F.1    Fontaine, C.2    Furon, T.3
  • 77
    • 21844460192 scopus 로고    scopus 로고
    • Watermark attack based on blind estimation without priors
    • Proc. International Workshop on Digital Watermarking, IWDW. of, Seoul, Korea, Springer
    • Du, J., Lee, C., Lee, H., Suh, Y.: Watermark attack based on blind estimation without priors. In: Proc. International Workshop on Digital Watermarking, IWDW. Volume 2613 of Lecture Notes in Computer Science., Seoul, Korea, Springer (2002)
    • (2002) Lecture Notes in Computer Science , vol.2613
    • Du, J.1    Lee, C.2    Lee, H.3    Suh, Y.4
  • 78
    • 0027541192 scopus 로고
    • The foundations of set theoretic estimation
    • Combettes, P.L.: The foundations of set theoretic estimation. Proceedings of the IEEE 81 (1993) 182-208
    • (1993) Proceedings of the IEEE , vol.81 , pp. 182-208
    • Combettes, P.L.1
  • 79
    • 0024750676 scopus 로고
    • Set membership identification in digital signal processing
    • Deller, J.R.: Set membership identification in digital signal processing. IEEE ASSP Magazine 6 (1989) 4-20
    • (1989) IEEE ASSP Magazine , vol.6 , pp. 4-20
    • Deller, J.R.1
  • 81
    • 33646182858 scopus 로고    scopus 로고
    • Security of DM quantization watermarking schemes: A practical study for digital images
    • Barni, M, Cox, I, Kalker, T, Kim, H.J, eds, Siena, Italy, Springer
    • Bas, P., Hurri, J.: Security of DM quantization watermarking schemes: a practical study for digital images. In Barni, M., Cox, I., Kalker, T., Kim, H.J., eds.: Fourth International Workshop on Digital Watermarking. Volume 3710., Siena, Italy, Springer (2005) 186-200
    • (2005) Fourth International Workshop on Digital Watermarking , vol.3710 , pp. 186-200
    • Bas, P.1    Hurri, J.2
  • 83
    • 84937814312 scopus 로고    scopus 로고
    • High capacity despite better steganalysis (F5-A steganographic algorithm)
    • Int. Workshop on Information Hiding, IH'01. of, New York, NY, USA, Springer Verlag
    • Westfeld, A.: High capacity despite better steganalysis (F5-A steganographic algorithm). In: Int. Workshop on Information Hiding, IH'01. Volume 2137 of Lecture Notes in Computer Science., New York, NY, USA, Springer Verlag (2001) 289-302
    • (2001) Lecture Notes in Computer Science , vol.2137 , pp. 289-302
    • Westfeld, A.1
  • 84
    • 85084160704 scopus 로고    scopus 로고
    • Defending against statistical steganalysis
    • Washington DC, USA
    • Provos, N.: Defending against statistical steganalysis. In: 10th USENIX Security Symposium, Washington DC, USA (2001) 323-336
    • (2001) 10th USENIX Security Symposium , pp. 323-336
    • Provos, N.1
  • 87
    • 0007751316 scopus 로고    scopus 로고
    • Analysis of the sensitivity attack against electronic watermarks in images
    • Aucsmith, D, ed, 2nd International Workshop on Information Hiding, IH'98. of, Portland, OR, USA, Springer Verlag
    • Linnartz, J.P.M.G., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In Aucsmith, D., ed.: 2nd International Workshop on Information Hiding, IH'98. Volume 1525 of Lecture Notes in Computer Science., Portland, OR, USA, Springer Verlag (1998) 258-272
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 258-272
    • Linnartz, J.P.M.G.1    van Dijk, M.2
  • 91
    • 33646190288 scopus 로고    scopus 로고
    • Oracle attacks and covert channels
    • Barni, M, Cox, I, Kalker, T, Kim, H.J, eds, Fourth International Workshop on Digital Watermarking. of, Siena, Italy, Springer
    • Venturini I.: Oracle attacks and covert channels. In Barni, M., Cox, I., Kalker, T., Kim, H.J., eds.: Fourth International Workshop on Digital Watermarking. Volume 3710 of Lecture Notes in Computer Science., Siena, Italy, Springer (2005) 171-185
    • (2005) Lecture Notes in Computer Science , vol.3710 , pp. 171-185
    • Venturini, I.1
  • 92
    • 33645698671 scopus 로고    scopus 로고
    • Choubassi, M.E., Moulin, P.: On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks. In III, E.J.D., Wong, P.W., eds.: Security, Steganography, and Watermarking of Multimedia Contents VIII. 6072., SPIE (2006)
    • Choubassi, M.E., Moulin, P.: On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks. In III, E.J.D., Wong, P.W., eds.: Security, Steganography, and Watermarking of Multimedia Contents VIII. Volume 6072., SPIE (2006)
  • 94
    • 33646182640 scopus 로고    scopus 로고
    • The return of the sensitivity attack
    • Barni, M, Cox, I, Kalker, T, Kim, H.J, eds, International Workshop on Digital Watermarking. of, Siena, Italy, Springer
    • Comesaña, P., Pérez-Freire, L., Pérez- González, F.: The return of the sensitivity attack. In Barni, M., Cox, I., Kalker, T., Kim, H.J., eds.: International Workshop on Digital Watermarking. Volume 3710 of Lecture Notes in Computer Science., Siena, Italy, Springer (2005) 260-274
    • (2005) Lecture Notes in Computer Science , vol.3710 , pp. 260-274
    • Comesaña, P.1    Pérez-Freire, L.2    Pérez- González, F.3
  • 97
  • 99
    • 0032072064 scopus 로고    scopus 로고
    • Watermarking of uncompressed and compressed video
    • Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66 (1998) 283-301
    • (1998) Signal Processing , vol.66 , pp. 283-301
    • Hartung, F.1    Girod, B.2
  • 100
    • 0442326757 scopus 로고    scopus 로고
    • Transformed-key asymmetric watermarking system
    • Choi, H., Lee, K., Kim, T.: Transformed-key asymmetric watermarking system. IEEE Signal Processing Letters 11 (2004) 251-254
    • (2004) IEEE Signal Processing Letters , vol.11 , pp. 251-254
    • Choi, H.1    Lee, K.2    Kim, T.3
  • 101
    • 1642299017 scopus 로고    scopus 로고
    • An asymmetric watermarking system with many embedding watermarks corresponding to one detection watermark
    • Kim, T.Y., Choi, H., Lee, K., Kim, T.: An asymmetric watermarking system with many embedding watermarks corresponding to one detection watermark. IEEE Signal Processing Letters 11 (2004) 375-377
    • (2004) IEEE Signal Processing Letters , vol.11 , pp. 375-377
    • Kim, T.Y.1    Choi, H.2    Lee, K.3    Kim, T.4
  • 105
    • 0002884288 scopus 로고    scopus 로고
    • An asymmetric public detection watermarking technique
    • Pfitzmann, A, ed, Dresden, Germany, Springer Verlag
    • Furon, T., Duhamel, P.: An asymmetric public detection watermarking technique. In Pfitzmann, A., ed.: Proc. of the third Int. Workshop on Information Hiding, Dresden, Germany, Springer Verlag (1999) 88-100
    • (1999) Proc. of the third Int. Workshop on Information Hiding , pp. 88-100
    • Furon, T.1    Duhamel, P.2
  • 106
    • 0037851028 scopus 로고    scopus 로고
    • An asymmetric watermarking method
    • Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery
    • Furon, T., Duhamel, P.: An asymmetric watermarking method. IEEE Trans. on Signal Processing 51 (2003) 981-995 Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery.
    • (2003) IEEE Trans. on Signal Processing , vol.51 , pp. 981-995
    • Furon, T.1    Duhamel, P.2
  • 109
    • 0036028641 scopus 로고    scopus 로고
    • Hurley, N.J., Silvestre, G.C.M.: Nth-order audio watermarking. In III, E.J.D., Wong, P.W., eds.: Security and Watermarking of Multimedia Contents IV. 4675 of Proc. of SPIE., San José, CA, USA (2002) 102-109
    • Hurley, N.J., Silvestre, G.C.M.: Nth-order audio watermarking. In III, E.J.D., Wong, P.W., eds.: Security and Watermarking of Multimedia Contents IV. Volume 4675 of Proc. of SPIE., San José, CA, USA (2002) 102-109
  • 112
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof-systems
    • Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems. In: SIAM Journal of Computing. Volume 18. (1989) 186-208
    • (1989) SIAM Journal of Computing , vol.18 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 114
    • 84983104598 scopus 로고
    • On defining proofs of knowledge
    • Proceedings of Crypto'92. of, Springer-Verlag
    • Mihil Bellare, O.G.: On defining proofs of knowledge. In: Proceedings of Crypto'92. Volume 740 of Lecture Notes in Computer Science., Springer-Verlag (1992) 390-420
    • (1992) Lecture Notes in Computer Science , vol.740 , pp. 390-420
    • Mihil Bellare, O.G.1
  • 117
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 (1978) 120-176
    • (1978) Communications of the ACM , vol.21 , pp. 120-176
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 118
    • 35248829262 scopus 로고    scopus 로고
    • Zero knowledge watermark detection
    • Information Hiding: Third International Workshop. of, Springer
    • Craver, S.: Zero knowledge watermark detection. In: Information Hiding: Third International Workshop. Volume 1768 of Lecture Notes in Computer Science., Springer (2000) 101-116
    • (2000) Lecture Notes in Computer Science , vol.1768 , pp. 101-116
    • Craver, S.1
  • 119
    • 0030409662 scopus 로고    scopus 로고
    • A method for signature casting on digital images
    • Pitas, I.: A method for signature casting on digital images. In: Proceedings of ICIP. Volume 3. (1996) 215-218
    • (1996) Proceedings of ICIP , vol.3 , pp. 215-218
    • Pitas, I.1
  • 120
    • 24744452204 scopus 로고    scopus 로고
    • Cryptography meets watermarking: Detecting watermarks with minimal- or zero-knowledge disclosure
    • Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: Cryptography meets watermarking: Detecting watermarks with minimal- or zero-knowledge disclosure. In: XI European Signal Processing Conference. Volume I. (2003) 446-449
    • (2003) XI European Signal Processing Conference , vol.1 , pp. 446-449
    • Adelsbach, A.1    Katzenbeisser, S.2    Sadeghi, A.R.3
  • 121
    • 1442310343 scopus 로고    scopus 로고
    • Commitment schemes and zero-knowledge protocols
    • Lectures on data security: modern cryptology in theory and practise. of, Springer-Verlag
    • Damgård, I.: Commitment schemes and zero-knowledge protocols. In: Lectures on data security: modern cryptology in theory and practise. Volume 1561 of Lecture Notes in Computer Science., Springer-Verlag (1998) 63-86
    • (1998) Lecture Notes in Computer Science , vol.1561 , pp. 63-86
    • Damgård, I.1
  • 123
    • 84957685616 scopus 로고    scopus 로고
    • A practical and provably secure scheme for publicly verifiable secret sharing and its applications
    • Proceedings of EUROCRYPT'98. of, Springer
    • Fujisaki, E., Okamoto, T.: A practical and provably secure scheme for publicly verifiable secret sharing and its applications. In: Proceedings of EUROCRYPT'98. Volume 1403 of Lecture Notes in Computer Science., Springer (1998) 32-46
    • (1998) Lecture Notes in Computer Science , vol.1403 , pp. 32-46
    • Fujisaki, E.1    Okamoto, T.2
  • 124
    • 84958774556 scopus 로고    scopus 로고
    • A statistically-hiding integer commitment scheme based on groups with hidden order
    • ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security. of, Spriger-Verlag
    • Damgård, I., Fujisaki, E.: A statistically-hiding integer commitment scheme based on groups with hidden order. In: ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security. Volume 2501 of Lecture Notes in Computer Science., Spriger-Verlag (2002) 125-142
    • (2002) Lecture Notes in Computer Science , vol.2501 , pp. 125-142
    • Damgård, I.1    Fujisaki, E.2
  • 125
    • 38549143493 scopus 로고    scopus 로고
    • Piva, A., Corazzi, D., Rosa, A.D., Barni, M.: Zero knowledge st-dm watermarking. In III, E.J.D., Wong, P.W., eds.: Security, Steganography, and Watermarking of Multimedia Contents VIII, SPIE, San José, California, USA (2006)
    • Piva, A., Corazzi, D., Rosa, A.D., Barni, M.: Zero knowledge st-dm watermarking. In III, E.J.D., Wong, P.W., eds.: Security, Steganography, and Watermarking of Multimedia Contents VIII, SPIE, San José, California, USA (2006)
  • 129
    • 33646128241 scopus 로고    scopus 로고
    • Non-interactive watermark detection for a correlation-based watermarking scheme
    • Communications and Multimedia Security: 9th IFIP TC-6 TC-11International Conference, CMS, of, Spriger-Verlag
    • Adelsbach, A., Rohe, M., Sadeghi, A.R.: Non-interactive watermark detection for a correlation-based watermarking scheme. In: Communications and Multimedia Security: 9th IFIP TC-6 TC-11International Conference, CMS 2005. Volume 3677 of Lecture Notes in Computer Science., Spriger-Verlag (2005) 129-139
    • (2005) Lecture Notes in Computer Science , vol.3677 , pp. 129-139
    • Adelsbach, A.1    Rohe, M.2    Sadeghi, A.R.3
  • 130
    • 13244278081 scopus 로고    scopus 로고
    • Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding
    • Abrardo, A., Barni, M.: Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding. IEEE Transactions on Signal Processing 53 (2005) 824-833
    • (2005) IEEE Transactions on Signal Processing , vol.53 , pp. 824-833
    • Abrardo, A.1    Barni, M.2
  • 132
    • 3042519430 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • Cachin, C.: An information-theoretic model for steganography. Information and Computation 192 (2004) 41-56
    • (2004) Information and Computation , vol.192 , pp. 41-56
    • Cachin, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.