Watermarking security: theory and practice

F Cayre, C Fontaine, T Furon - IEEE Transactions on signal …, 2005 - ieeexplore.ieee.org
This paper proposes a theory of watermarking security based on a cryptanalysis point of
view. The main idea is that information about the secret key leaks from the observations, for …

Security pitfalls of frame-by-frame approaches to video watermarking

G Doërr, JL Dugelay - IEEE Transactions on Signal Processing, 2004 - ieeexplore.ieee.org
Watermarking digital video material is usually considered as watermarking a sequence of
still images. However, such a frame-by-frame approach is very risky since straightforward …

Spread-spectrum watermarking security

L Pérez-Freire, F Pérez-González - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
This paper presents both theoretical and practical analyses of the security offered by
watermarking and data hiding methods based on spread spectrum. In this context, security is …

Watermarking security: a survey

L Perez-Freire, P Comesana… - Transactions on data …, 2006 - Springer
Watermarking security has emerged in the last years as as a new subject in the
watermarking area. As it brings new challenges to the design of watermarking systems, a …

Kerckhoffs-based embedding security classes for woa data hiding

F Cayre, P Bas - IEEE Transactions on Information Forensics …, 2008 - ieeexplore.ieee.org
It has recently been discovered that using pseudorandom sequences as carriers in spread-
spectrum techniques for data-hiding is not at all a sufficient condition for ensuring data …

[PDF][PDF] Broken arrows

T Furon, P Bas - EURASIP Journal on Information Security, 2008 - Springer
This paper makes an account of the design and investigations done for the still image
watermarking technique used in the 2nd edition of the BOWS challenge. This technique is …

A study on the security levels of spread-spectrum embedding schemes in the WOA framework

YG Wang, G Zhu, S Kwong… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Security analysis is a very important issue for digital watermarking. Several years ago,
according to Kerckhoffs' principle, the famous four security levels, namely insecurity, key …

[PDF][PDF] How Reed-Solomon codes can improve steganographic schemes

C Fontaine, F Galand - EURASIP Journal on Information Security, 2009 - Springer
The use of syndrome coding in steganographic schemes tends to reduce distortion during
embedding. The more complete model comes from the wet papers (J. Fridrich et al., 2005) …

Achieving subspace or key security for WOA using natural or circular watermarking

P Bas, F Cayre - Proceedings of the 8th Workshop on Multimedia and …, 2006 - dl.acm.org
This paper presents two watermarking schemes that are secure when considering the
Watermarked content Only Attack (WOA) framework. The definition of watermark security is …

Natural watermarking: a secure spread spectrum technique for woa

P Bas, F Cayre - International Workshop on Information Hiding, 2006 - Springer
This paper presents a spread spectrum (SS) watermarking technique that is secure against
carriers estimation in a Watermark Only Attack framework. After reviewing the sufficient …