메뉴 건너뛰기




Volumn 4, Issue 1, 2009, Pages 2-24

Spread-spectrum watermarking security

Author keywords

Constant modulus; Equivocation; Independent component analysis (ICA); Information leakage; Parameter estimation; Principal component analysis (PCA); Spread spectrum; Watermarking security

Indexed keywords

HEMODYNAMICS; INDEPENDENT COMPONENT ANALYSIS; INFORMATION THEORY; METAL ANALYSIS; PARAMETER ESTIMATION; PRINCIPAL COMPONENT ANALYSIS; SPECTRUM ANALYSIS; WATERMARKING;

EID: 60649107569     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2008.2009603     Document Type: Article
Times cited : (77)

References (37)
  • 2
    • 0041320695 scopus 로고    scopus 로고
    • A general framework for robust watermarking security
    • Feb
    • M. Barni, F. Bartolini, and T. Furon, "A general framework for robust watermarking security," Signal Process., vol. 83, no. 10, pp. 2069-2084, Feb. 2003.
    • (2003) Signal Process , vol.83 , Issue.10 , pp. 2069-2084
    • Barni, M.1    Bartolini, F.2    Furon, T.3
  • 3
    • 21844463487 scopus 로고    scopus 로고
    • Watermarking security: Theory and practice
    • Oct
    • F. Cayre, C. Fontaine, and T. Furon, "Watermarking security: Theory and practice," IEEE Trans. Signal Process., vol. 53, no. 10, pt. 2, pp. 3976-3987, Oct. 2005.
    • (2005) IEEE Trans. Signal Process , vol.53 , Issue.10 PART. 2 , pp. 3976-3987
    • Cayre, F.1    Fontaine, C.2    Furon, T.3
  • 4
    • 60649086754 scopus 로고    scopus 로고
    • P. Comesaña, L. Pérez-Freire, and F. Pérez- González, Fundamentals of data hiding security and their application to spread-spectrum analysis, in Proc. 7th Information Hiding Workshop, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer-Verlag, Jun. 2005, Barcelona, Spain.
    • P. Comesaña, L. Pérez-Freire, and F. Pérez- González, "Fundamentals of data hiding security and their application to spread-spectrum analysis," in Proc. 7th Information Hiding Workshop, ser. Lect. Notes Comput. Sci. Berlin, Germany: Springer-Verlag, Jun. 2005, Barcelona, Spain.
  • 5
    • 33646182858 scopus 로고    scopus 로고
    • P. Bas and J. Hurri, M. Barni, I. Cox, T. Kalker, and H. J. Kim, Eds., Security of DM quantization watermarking schemes: A practical study for digital images, in Pmc. 4th Int. Workshop Digital Watermarking. Berlin, Germany: Springer-Verlag, Sep. 2005, 3710, pp. 186-200, Siena, Italy.
    • P. Bas and J. Hurri, , M. Barni, I. Cox, T. Kalker, and H. J. Kim, Eds., "Security of DM quantization watermarking schemes: A practical study for digital images," in Pmc. 4th Int. Workshop Digital Watermarking. Berlin, Germany: Springer-Verlag, Sep. 2005, vol. 3710, pp. 186-200, Siena, Italy.
  • 7
    • 49949104907 scopus 로고    scopus 로고
    • L. Pérez-Freire and F. Pérez-González, Exploiting security holes in lattice data hiding, in Proc. 9th Information Hiding Workshop, ser. Lect. Notes Comput. Sci. Saint Malo, France: Springer-Verlag, Jun. 2007.
    • L. Pérez-Freire and F. Pérez-González, "Exploiting security holes in lattice data hiding," in Proc. 9th Information Hiding Workshop, ser. Lect. Notes Comput. Sci. Saint Malo, France: Springer-Verlag, Jun. 2007.
  • 8
    • 0031362116 scopus 로고    scopus 로고
    • Secure spread spectrum watermarking for images, audio and video
    • Dec
    • I. J. Cox, J. Killian, T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for images, audio and video," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
    • (1997) IEEE Trans. Image Process , vol.6 , Issue.12 , pp. 1673-1687
    • Cox, I.J.1    Killian, J.2    Leighton, T.3    Shamoon, T.4
  • 9
    • 0038527382 scopus 로고    scopus 로고
    • The zero-rate spread-spectrum water-marking game
    • Apr
    • P. Moulin and A. Ivanović, "The zero-rate spread-spectrum water-marking game," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1098-1117, Apr. 2003.
    • (2003) IEEE Trans. Signal Process , vol.51 , Issue.4 , pp. 1098-1117
    • Moulin, P.1    Ivanović, A.2
  • 10
    • 0038527410 scopus 로고    scopus 로고
    • Improved Spread Spectrum: A new modulation technique for robust watermarking
    • Apr
    • H. S. Malvar and D. A. F. Florêncio, "Improved Spread Spectrum: A new modulation technique for robust watermarking," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 898-905, Apr. 2003.
    • (2003) IEEE Trans. Signal Process , vol.51 , Issue.4 , pp. 898-905
    • Malvar, H.S.1    Florêncio, D.A.F.2
  • 12
    • 39449113677 scopus 로고    scopus 로고
    • Kerckhoffs-based embedding security classes for WOA data hiding
    • Mar
    • F. Cayre and P. Bas, "Kerckhoffs-based embedding security classes for WOA data hiding," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 1-15, Mar. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.1 , pp. 1-15
    • Cayre, F.1    Bas, P.2
  • 16
    • 14644386952 scopus 로고    scopus 로고
    • Singular random matrix decompositions: Jacobians
    • J. A. Díaz-García and G. González-Farías, "Singular random matrix decompositions: Jacobians," J. Multivariate Anal., vol. 93, no. 2, pp. 296-312, 2005.
    • (2005) J. Multivariate Anal , vol.93 , Issue.2 , pp. 296-312
    • Díaz-García, J.A.1    González-Farías, G.2
  • 18
    • 60649120240 scopus 로고    scopus 로고
    • Ph.D. dissertation, Signal Theory Commun. Dept, Univ. Vigo, Vigo, Spain
    • L. Pérez-Freire, "Digital watermarking security," Ph.D. dissertation, Signal Theory Commun. Dept., Univ. Vigo, Vigo, Spain, 2008.
    • (2008) Digital watermarking security
    • Pérez-Freire, L.1
  • 21
    • 0032629347 scopus 로고    scopus 로고
    • Fast and robust fixed-point algorithms for independent component analysis
    • May
    • A. Hyvärinen, "Fast and robust fixed-point algorithms for independent component analysis," IEEE Trans. Neural Netw., vol. 10, no. 3, pp. 626-634, May 1999.
    • (1999) IEEE Trans. Neural Netw , vol.10 , Issue.3 , pp. 626-634
    • Hyvärinen, A.1
  • 22
    • 0028416938 scopus 로고
    • Independent component analysis, a new concept?
    • P. Comon, "Independent component analysis, a new concept?," Signal Process., vol. 36, pp. 287-314, 1994.
    • (1994) Signal Process , vol.36 , pp. 287-314
    • Comon, P.1
  • 23
    • 0000263797 scopus 로고
    • Projection pursuit
    • Jun
    • P. J. Huber, "Projection pursuit," Ann. Statist., vol. 13, no. 2, pp. 435-475, Jun. 1985.
    • (1985) Ann. Statist , vol.13 , Issue.2 , pp. 435-475
    • Huber, P.J.1
  • 24
    • 33750916795 scopus 로고    scopus 로고
    • Achieving subspace or key security for WOA using natural or circular watermarking
    • presented at the, Geneva, Switzerland, Sep
    • P. Bas and F. Cayre, "Achieving subspace or key security for WOA using natural or circular watermarking," presented at the ACM Multimedia and Security Workshop, Geneva, Switzerland, Sep. 2006.
    • (2006) ACM Multimedia and Security Workshop
    • Bas, P.1    Cayre, F.2
  • 25
    • 0031375733 scopus 로고    scopus 로고
    • One-unit contrast functions for Independent Component Analysis: A statistical analysis
    • Amelia Island, FL, Sep. 24-26
    • A. Hyvärinen, "One-unit contrast functions for Independent Component Analysis: A statistical analysis," in Proc. VII IEEE Workshop on Neural Networks for Signal Processing, Amelia Island, FL, Sep. 24-26, 1997, pp. 388-397.
    • (1997) Proc. VII IEEE Workshop on Neural Networks for Signal Processing , pp. 388-397
    • Hyvärinen, A.1
  • 26
    • 0032188650 scopus 로고    scopus 로고
    • Blind equalization using the constant modulus criterion: A review
    • Oct
    • C. R. Jonhson, P. Schniter, T. J. Endres, J. D. Behm, D. R. Brown, and R. A. Casas, "Blind equalization using the constant modulus criterion: A review," Proc. IEEE, vol. 86, no. 10, pp. 1927-1950, Oct. 1998.
    • (1998) Proc. IEEE , vol.86 , Issue.10 , pp. 1927-1950
    • Jonhson, C.R.1    Schniter, P.2    Endres, T.J.3    Behm, J.D.4    Brown, D.R.5    Casas, R.A.6
  • 27
    • 0032216898 scopus 로고    scopus 로고
    • The geometry of algorithms with orthogonality constraints
    • A. Edelman, T. A. Arias, and S. T. Smith, "The geometry of algorithms with orthogonality constraints," SIAM J. Matrix Analysis Applications, vol. 20, no. 2, pp. 303-353, 1998.
    • (1998) SIAM J. Matrix Analysis Applications , vol.20 , Issue.2 , pp. 303-353
    • Edelman, A.1    Arias, T.A.2    Smith, S.T.3
  • 28
    • 60649114309 scopus 로고    scopus 로고
    • USC-SIPI image database, Online, Available
    • USC-SIPI image database. [Online]. Available: http://sipi.usc.edu/ database/.
  • 29
    • 34147121415 scopus 로고    scopus 로고
    • New algorithms for blind equalization: The constant norm algorithm family
    • Apr
    • A. Goupil and J. Palicot, "New algorithms for blind equalization: The constant norm algorithm family," IEEE Trans. Signal Process., vol. 55, no. 4, pp. 1436-1444, Apr. 2007.
    • (2007) IEEE Trans. Signal Process , vol.55 , Issue.4 , pp. 1436-1444
    • Goupil, A.1    Palicot, J.2
  • 30
    • 0030519411 scopus 로고    scopus 로고
    • Packing lines, planes, etc.: Packings in grassmanian spaces
    • J. H. Conway, R. H. Hardin, and N. J. A. Sloane, "Packing lines, planes, etc.: Packings in grassmanian spaces," Exper. Math., vol. 5, no. 2, pp. 139-159, 1996.
    • (1996) Exper. Math , vol.5 , Issue.2 , pp. 139-159
    • Conway, J.H.1    Hardin, R.H.2    Sloane, N.J.A.3
  • 31
    • 23044501260 scopus 로고    scopus 로고
    • Principal angles between subspaces as related to Rayleigh quotient and Rayleigh Ritz inequalities with applications to eigenvalue accuracy and an eigenvalue solver,
    • Ph.D. dissertation, Univ. Colorado, Denver, CO
    • M. E. Argentati, "Principal angles between subspaces as related to Rayleigh quotient and Rayleigh Ritz inequalities with applications to eigenvalue accuracy and an eigenvalue solver," Ph.D. dissertation, Univ. Colorado, Denver, CO, 2003.
    • (2003)
    • Argentati, M.E.1
  • 32
    • 57349129030 scopus 로고    scopus 로고
    • T. Furon and P. Bas, Broken arrows, Eurasip J. Information Security, 2008, pp. 1-13, 2008, article ID 597040.
    • T. Furon and P. Bas, "Broken arrows," Eurasip J. Information Security, vol. 2008, pp. 1-13, 2008, article ID 597040.
  • 33
    • 60649104020 scopus 로고    scopus 로고
    • Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks
    • E. J. DeIp, III, P. W. Wong, J. Dittmann, and N. Memon, Eds. San Jose, CA: SPIE, Jan
    • P. Comesaña, M. Barni, and N. Merhav, "Asymptotically optimum embedding strategy for one-bit watermarking under Gaussian attacks," in Proc. Security, Forensics, Steganogmphy, and Watermarking of Multimedia Contents X, E. J. DeIp, III, P. W. Wong, J. Dittmann, and N. Memon, Eds. San Jose, CA: SPIE, Jan. 2008, vol. 6819.
    • (2008) Proc. Security, Forensics, Steganogmphy, and Watermarking of Multimedia Contents X , vol.6819
    • Comesaña, P.1    Barni, M.2    Merhav, N.3
  • 34
    • 0035333687 scopus 로고    scopus 로고
    • Quantization Index Modulation: A class of provably good methods for digital watermarking and information embedding
    • May
    • B. Chen and G. Wornell, "Quantization Index Modulation: A class of provably good methods for digital watermarking and information embedding," IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
    • (2001) IEEE Trans. Inf. Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.2
  • 35
    • 0037737759 scopus 로고    scopus 로고
    • Scalar Costa Scheme for information embedding
    • Apr, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery
    • J. J. Eggers, R. Bäuml, R. Tzschoppe, and B. Girod, "Scalar Costa Scheme for information embedding," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1003-1019, Apr. 2003, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery.
    • (2003) IEEE Trans. Signal Process , vol.51 , Issue.4 , pp. 1003-1019
    • Eggers, J.J.1    Bäuml, R.2    Tzschoppe, R.3    Girod, B.4
  • 36
    • 0038188753 scopus 로고    scopus 로고
    • Performance analysis of existing and new methods for data hiding with known-host information in additive channels
    • Apr, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery
    • F. Pérez-González, F. Balado, and J. R. Hernández, "Performance analysis of existing and new methods for data hiding with known-host information in additive channels," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 960-980, Apr. 2003, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery.
    • (2003) IEEE Trans. Signal Process , vol.51 , Issue.4 , pp. 960-980
    • Pérez-González, F.1    Balado, F.2    Hernández, J.R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.