Accès à distance ? S'identifier sur le proxy UCLouvain | Saint-Louis
Comparison of secure spread-spectrum modulations applied to still image watermarking
Primary tabs
Document type | Article de périodique (Journal article) – Article de recherche |
---|---|
Access type | Accès restreint |
Publication date | 2009 |
Language | Anglais |
Journal information | "Annales des Télécommunications" - Vol. 64, no. 11-12, p. 801-813 (2009) |
Peer reviewed | yes |
Publisher | Springer France (Paris) |
issn | 0003-4347 |
e-issn | 1958-9395 |
Publication status | Publié |
Affiliations |
UCL
- FSA/ELEC - Département d'électricité Grenoble-INP - GIPSA-LAB |
Keywords | Watermarking ; Security ; Still images |
Links |
- Cayre F, Furon T, Fontaine C (2005) Watermarking security: theory and practice. IEEE Trans Sig Proc 53(10):3976–3987
- Kerckhoffs A (1883) La cryptographie militaire. J Sci Mil IX:5–38
- Comesaña P, Pérez-Freire L, Pérez-González F (2005) Fundamentals of data hiding security and their application to spread-spectrum analysis. In: 7th information hiding workshop, IH05. Lecture notes in computer science. Springer, Barcelona
- Cayre F, Bas P (2008) Kerckhoffs-based embedding security classes for woa data hiding. IEEE Trans Inf For Sec 3(1):1–15
- Cox IJ, Killian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
- Malvar HS, Flôrencio D (2003) Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans Signal Process 53:898–905
- Cox IJ, Doërr G, Furon T (2006) Watermarking is not cryptography. In: Proc. international workshop on digital watermarking (IWDW). http://www.adastral.ucl.ac.uk/~icox/papers/2006/IWDW2006.pdf
- Bas P, Cayre F (2006) Natural watermarking: a secure spread spectrum technique for woa. In: Proc. information hiding, Alexandria
- Bas P, Cayre F (2006) Achieving subspace or key security for woa using natural or circular watermarking. In: Proc. ACM multimedia security workshop, Geneva
- Piva A, Barni M, Bartolini F, Cappellini V (1997) DCT-based watermark recovering without resorting to the uncorrupted original image. In: IEEE signal processing society 1997 international conference on image processing (ICIP’97), Santa Barbara
- Furon T, Bas P (2008) Broken arrows. EURASIP J Inf Secur 2008(ID 597040)
- Bas P, Furon T (2008) Break our watermarking system, 2nd edn. http://bows2.gipsa-lab.inpg.fr
- Hyvärinen A, Karhunen J, Oja E (2001) Independent component analysis. Wiley, New York
- Cayre F, Fontaine C, Furon T (2004) Watermarking attack: security of wss techniques. In: Proc. international workshop on digital watermarking (IWDW). Lecture notes on computer science (3304). Springer, New York, pp 171–183
- Hyvarinen A (1999) Fast and robust fixed-point algorithm for independent component analysis. IEEE Trans Neur Net 10(3):626–634
- Bas P, Doërr G (2007) Practical security analysis of dirty paper trellis watermarking. In: Proc. information hiding, St-Malo
- Mathon B, Bas P, Cayre F, Pérez-González F (2008) Distortion optimization of model-based secure embedding schemes for data-hiding. In: Proc. information hiding, Santa-Barbara
Bibliographic reference | Mathon, Benjamin ; Bas, Patrick ; Cayre, Francois ; Macq, Benoît. Comparison of secure spread-spectrum modulations applied to still image watermarking. In: Annales des Télécommunications, Vol. 64, no. 11-12, p. 801-813 (2009) |
---|---|
Permanent URL | http://hdl.handle.net/2078.1/35113 |