메뉴 건너뛰기




Volumn , Issue , 2009, Pages 33-38

Optimization of natural watermarking using transportation theory

Author keywords

Hungarian method; Natural watermarking; Security; Transportation problem

Indexed keywords

GAUSSIAN SIGNALS; HUNGARIAN METHOD; NEW APPROACHES; SECRET KEY; SECURITY LEVEL; SPREAD-SPECTRUM WATERMARKING; WATERMARKING SCHEMES; WATERMARKING SECURITY;

EID: 70449623532     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1597817.1597824     Document Type: Conference Paper
Times cited : (9)

References (16)
  • 1
    • 38849168937 scopus 로고    scopus 로고
    • Natural watermarking: A secure spread spectrum technique for woa
    • Alexandria, VA, July
    • P. Bas and F. Cayre. Natural watermarking: a secure spread spectrum technique for woa. In Proc. Information Hiding, Alexandria, VA, July 2006.
    • (2006) Proc. Information Hiding
    • Bas, P.1    Cayre, F.2
  • 2
    • 49949088543 scopus 로고    scopus 로고
    • Practical security analysis of dirty paper trellis watermarking
    • P. Bas and G. J. Doërr. Practical security analysis of dirty paper trellis watermarking. In Proc. Information Hiding, pages 174-188, 2007.
    • (2007) Proc. Information Hiding , pp. 174-188
    • Bas, P.1    Doërr, G.J.2
  • 3
    • 39449135898 scopus 로고    scopus 로고
    • Vulnerability of dm watermarking of non-iid host signals to attacks utilising the statistics of independent components
    • Sept
    • P. Bas and J. Hurri. Vulnerability of dm watermarking of non-iid host signals to attacks utilising the statistics of independent components. In Information Security, IEE Proceedings, volume 153, pages 127-139, Sept. 2006.
    • (2006) Information Security, IEE Proceedings , vol.153 , pp. 127-139
    • Bas, P.1    Hurri, J.2
  • 4
    • 39449113677 scopus 로고    scopus 로고
    • Kerckhoffs-based embedding security classes for woa data hiding
    • Mar
    • F. Cayre and P. Bas. Kerckhoffs-based embedding security classes for woa data hiding. IEEE Trans. Inf. For. Sec., 3(1):1-15, Mar. 2008.
    • (2008) IEEE Trans. Inf. For. Sec , vol.3 , Issue.1 , pp. 1-15
    • Cayre, F.1    Bas, P.2
  • 5
    • 21844463487 scopus 로고    scopus 로고
    • Watermarking security: Theory and practice
    • Oct
    • F. Cayre, T. Furon, and C. Fontaine. Watermarking security: Theory and practice. IEEE Trans. Sig. Proc., 53(10):3976-3987, Oct. 2005.
    • (2005) IEEE Trans. Sig. Proc , vol.53 , Issue.10 , pp. 3976-3987
    • Cayre, F.1    Furon, T.2    Fontaine, C.3
  • 6
    • 0030519411 scopus 로고    scopus 로고
    • J. H. Conway, R. H. Hardin, and N. J. A. Sloane. Packing lines, planes, etc.: packings in grassmanian spaces. In Experimental Mathematics, 5(2), pages 139-159, 1996.
    • J. H. Conway, R. H. Hardin, and N. J. A. Sloane. Packing lines, planes, etc.: packings in grassmanian spaces. In Experimental Mathematics, volume 5(2), pages 139-159, 1996.
  • 8
    • 0002719797 scopus 로고
    • The Hungarian method of solving the assignment problem
    • H. W. Kuhn. The Hungarian method of solving the assignment problem. Naval Res. Logistics Quart., 2:83-97, 1955.
    • (1955) Naval Res. Logistics Quart , vol.2 , pp. 83-97
    • Kuhn, H.W.1
  • 9
    • 0035790994 scopus 로고    scopus 로고
    • Considerations on watermarking security
    • Oct
    • T. Kalker. Considerations on watermarking security. Proc. MMSP, pages 201-206, Oct. 2001.
    • (2001) Proc. MMSP , pp. 201-206
    • Kalker, T.1
  • 11
    • 0001010507 scopus 로고
    • On a problem of monge (in russian)
    • L. Kantorovitch. On a problem of monge (in russian). Uspekhi Math. Nauk., 3:225-226, 1948.
    • (1948) Uspekhi Math. Nauk , vol.3 , pp. 225-226
    • Kantorovitch, L.1
  • 13
    • 70449655848 scopus 로고    scopus 로고
    • Distortion optimization of model-based secure embedding schemes for data-hiding
    • Santa-Barbara, CA, USA, May
    • B. Mathon, P. Bas, F. Cayre, and F. Pérez-González. Distortion optimization of model-based secure embedding schemes for data-hiding. In Proc. Information Hiding, Santa-Barbara, CA, USA, May 2008.
    • (2008) Proc. Information Hiding
    • Mathon, B.1    Bas, P.2    Cayre, F.3    Pérez-González, F.4
  • 15


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.