메뉴 건너뛰기




Volumn 7, Issue 2, 2012, Pages 821-826

Controllable secure watermarking technique for tradeoff between robustness and security

Author keywords

Robustness; spread spectrum watermarking; watermarked only attack (WOA); watermarking security

Indexed keywords

HIGHER-DIMENSIONAL; HOST SIGNALS; INVARIANT DISTRIBUTION; INVARIANT SUBSPACE; ORTHOGONAL MATRIX; REMOVAL ATTACKS; SECRET CARRIERS; SPREAD-SPECTRUM WATERMARKING; WATERMARKED ONLY ATTACK (WOA); WATERMARKING SECURITY; WATERMARKING TECHNIQUES;

EID: 84863370651     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2012.2184093     Document Type: Conference Paper
Times cited : (23)

References (13)
  • 1
    • 33746628959 scopus 로고    scopus 로고
    • Fundamentals of data hiding security and their application to spread-spectrum analysis
    • Lectures Notes in Computer Science Springer- Verlag, Barcelona, Spain, Jun.
    • P. Comesana, L. Perez-Freire, and F. Perez-Gonzalez, "Fundamentals of data hiding security and their application to spread-spectrum analysis," in Proc. 7th Inf. Hiding Workshop (IH 2005), Lectures Notes in Computer Science, Springer-Verlag, Barcelona, Spain, Jun. 2005, vol. 3727, pp. 146-160.
    • (2005) Proc. 7th Inf. Hiding Workshop (IH 2005) , vol.3727 , pp. 146-160
    • Comesana, P.1    Perez-Freire, L.2    Perez-Gonzalez, F.3
  • 2
    • 21844463487 scopus 로고    scopus 로고
    • Watermarking security: Theory and practice
    • Oct.
    • F. Cayre, C. Fontaine, and T. Furon, "Watermarking security: Theory and practice," IEEE Trans. Signal Process., vol. 53, no. 10, pp. 3976-3987, Oct. 2005.
    • (2005) IEEE Trans. Signal Process. , vol.53 , Issue.10 , pp. 3976-3987
    • Cayre, F.1    Fontaine, C.2    Furon, T.3
  • 3
    • 0031362116 scopus 로고    scopus 로고
    • Secure spread spectrum watermarking for multimedia
    • Dec.
    • I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, Dec. 1997.
    • (1997) IEEE Trans. Image Process. , vol.6 , Issue.12 , pp. 1673-1687
    • Cox, I.J.1    Kilian, J.2    Leighton, F.T.3    Shamoon, T.4
  • 4
    • 0038527382 scopus 로고    scopus 로고
    • The zero-rate spread-spectrum watermarking game
    • Apr.
    • P. Moulin and A. Ivanovic, "The zero-rate spread-spectrum watermarking game," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 1098-1117, Apr. 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.4 , pp. 1098-1117
    • Moulin, P.1    Ivanovic, A.2
  • 5
    • 0038527410 scopus 로고    scopus 로고
    • Improved spread spectrum: A new modulation technique for robust watermarking
    • Apr.
    • H. S. Malvar and D. A. F. Florencio, "Improved spread spectrum: A new modulation technique for robust watermarking," IEEE Trans. Signal Process., vol. 51, no. 4, pp. 898-905, Apr. 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.4 , pp. 898-905
    • Malvar, H.S.1    Florencio, D.A.F.2
  • 6
    • 38049169784 scopus 로고    scopus 로고
    • Natural watermarking: A secure spread spectrum technique for woa
    • Lecture Notes in Computer Science Springer- Verlag, Alexandria, VA, Jul.
    • P. Bas and F. Cayre, "Natural watermarking: A secure spread spectrum technique for woa," in Proc. 8th Inf. Hiding Workshop (IH 2006), Lecture Notes in Computer Science, Springer-Verlag, Alexandria, VA, Jul. 2006, vol. 4437, pp. 1-14.
    • (2006) Proc. 8th Inf. Hiding Workshop (IH 2006) , vol.4437 , pp. 1-14
    • Bas, P.1    Cayre, F.2
  • 8
    • 33750916795 scopus 로고    scopus 로고
    • Achieving subspace or key security for woa using natural or circular watermarking
    • Geneva, Switzerland, Sep.
    • P. Bas and F. Cayre, "Achieving subspace or key security for woa using natural or circular watermarking," in Proc. 8th ACM Workshop Multimedia and Security (MM&Sec'06), Geneva, Switzerland, Sep. 2006, pp. 80-88.
    • (2006) Proc. 8th ACM Workshop Multimedia and Security (MM&Sec'06) , pp. 80-88
    • Bas, P.1    Cayre, F.2
  • 9
    • 39449113677 scopus 로고    scopus 로고
    • Kerckhoffs-based embedding security classes for woa data hiding
    • Mar.
    • F. Cayre and P. Bas, "Kerckhoffs-based embedding security classes for woa data hiding," IEEE Trans. Inf. Forensics Security, vol. 3, no. 1, pp. 1-15, Mar. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.1 , pp. 1-15
    • Cayre, F.1    Bas, P.2
  • 10
    • 78549287204 scopus 로고    scopus 로고
    • A new spread-spectrum watermarking scheme to achieve a trade-off between security and robustness
    • Lectures Notes in Computer Science Springer- Verlag, Calgary, AB, Canada, Jun.
    • J. Cao, J. Huang, and J. Ni, "A new spread-spectrum watermarking scheme to achieve a trade-off between security and robustness," in Proc. 12th Inf. Hiding Workshop (IH 2010), Lectures Notes in Computer Science, Springer-Verlag, Calgary, AB, Canada, Jun. 2010, vol. 6387, pp. 262-276.
    • (2010) Proc. 12th Inf. Hiding Workshop (IH 2010) , vol.6387 , pp. 262-276
    • Cao, J.1    Huang, J.2    Ni, J.3
  • 11
    • 0001010507 scopus 로고
    • On a problem of Monge
    • L. V. Kantorovich, "On a problem of Monge," Uspekhi Math. Nauk., vol. 3, pp. 225-226, 1948.
    • (1948) Uspekhi Math. Nauk. , vol.3 , pp. 225-226
    • Kantorovich, L.V.1
  • 12
    • 0021421774 scopus 로고
    • On the optimal mapping of distributions
    • M. Knott and C. S. Smith, "On the optimal mapping of distributions," J. Optimiz. Theory Applicat., vol. 43, pp. 39-49, 1984.
    • (1984) J. Optimiz. Theory Applicat. , vol.43 , pp. 39-49
    • Knott, M.1    Smith, C.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.