User menu

Comparison of secure spread-spectrum modulations applied to still image watermarking

Bibliographic reference Mathon, Benjamin ; Bas, Patrick ; Cayre, Francois ; Macq, Benoît. Comparison of secure spread-spectrum modulations applied to still image watermarking. In: Annales des Télécommunications, Vol. 64, no. 11-12, p. 801-813 (2009)
Permanent URL
  1. Cayre F, Furon T, Fontaine C (2005) Watermarking security: theory and practice. IEEE Trans Sig Proc 53(10):3976–3987
  2. Kerckhoffs A (1883) La cryptographie militaire. J Sci Mil IX:5–38
  3. Comesaña P, Pérez-Freire L, Pérez-González F (2005) Fundamentals of data hiding security and their application to spread-spectrum analysis. In: 7th information hiding workshop, IH05. Lecture notes in computer science. Springer, Barcelona
  4. Cayre F, Bas P (2008) Kerckhoffs-based embedding security classes for woa data hiding. IEEE Trans Inf For Sec 3(1):1–15
  5. Cox IJ, Killian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687
  6. Malvar HS, Flôrencio D (2003) Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans Signal Process 53:898–905
  7. Cox IJ, Doërr G, Furon T (2006) Watermarking is not cryptography. In: Proc. international workshop on digital watermarking (IWDW).
  8. Bas P, Cayre F (2006) Natural watermarking: a secure spread spectrum technique for woa. In: Proc. information hiding, Alexandria
  9. Bas P, Cayre F (2006) Achieving subspace or key security for woa using natural or circular watermarking. In: Proc. ACM multimedia security workshop, Geneva
  10. Piva A, Barni M, Bartolini F, Cappellini V (1997) DCT-based watermark recovering without resorting to the uncorrupted original image. In: IEEE signal processing society 1997 international conference on image processing (ICIP’97), Santa Barbara
  11. Furon T, Bas P (2008) Broken arrows. EURASIP J Inf Secur 2008(ID 597040)
  12. Bas P, Furon T (2008) Break our watermarking system, 2nd edn.
  13. Hyvärinen A, Karhunen J, Oja E (2001) Independent component analysis. Wiley, New York
  14. Cayre F, Fontaine C, Furon T (2004) Watermarking attack: security of wss techniques. In: Proc. international workshop on digital watermarking (IWDW). Lecture notes on computer science (3304). Springer, New York, pp 171–183
  15. Hyvarinen A (1999) Fast and robust fixed-point algorithm for independent component analysis. IEEE Trans Neur Net 10(3):626–634
  16. Bas P, Doërr G (2007) Practical security analysis of dirty paper trellis watermarking. In: Proc. information hiding, St-Malo
  17. Mathon B, Bas P, Cayre F, Pérez-González F (2008) Distortion optimization of model-based secure embedding schemes for data-hiding. In: Proc. information hiding, Santa-Barbara