2005
DOI: 10.1007/11558859_12
|View full text |Cite
|
Sign up to set email alerts
|

Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 52 publications
(49 citation statements)
references
References 10 publications
0
46
0
Order By: Relevance
“…4] are tools used for this purpose. We will not address the differences between this two tools (see [24,Sect. 2]).…”
Section: Robust Watermarkingmentioning
confidence: 99%
“…4] are tools used for this purpose. We will not address the differences between this two tools (see [24,Sect. 2]).…”
Section: Robust Watermarkingmentioning
confidence: 99%
“…There have been great achievements for secure watermarking algorithms [4][5][6][7][8][9][10] and security assessment models [11][12][13][14].…”
Section: Introductionmentioning
confidence: 99%
“…Both assessment model and performance index are very important tools to distinguish different algorithms, and as we know, security is a very special performance index different from robustness, so the assessment model for security is a research hotspot [11][12][13]. The analysis methods of watermarking security can be divided to three classes [14]: analysis method based on information theory proposed by Shanoon, analysis method based on Fisher information matrix and analysis method based on computation complexity.…”
Section: Introductionmentioning
confidence: 99%
“…High-granular requirements may be secrecy, integrity or authenticity of the watermark, dependency of the watermark on the cover-data (to prevent copy attacks), as well as robustness and collusion tolerance to name only the most important ones. Barely any application (if any at all) requires a single watermarking scheme to provide all these high-granular properties 9 , beside the fact that it is a difficult, and unnecessary, task to design such watermarking scheme.…”
Section: Summary and Discussionmentioning
confidence: 99%
“…Comesaña et al [8,9] closely follow the inadequate notion of security (information leakage) introduced in [6,7] as mentioned above. Their main achievement, compared to [7] is the definition of a new measure to quantify the leaked information and its application to spread spectrum watermarking.…”
Section: Related Workmentioning
confidence: 99%