1 - 6 of 6 Chapters
[This book couldn’t have been written without a collaborative work between the main author (Patrick Bas) and his colleagues.]
[In order to understand and analyse the main components of watermarking security presented in the next chapters, we introduce in this chapter the different elements needed to embed a watermark or a message inside a host content. We first present a functional view of a watermarking scheme (the...
[If one of the first paper on digital watermarking published in 1996 was named “Secure Spread Spectrum Watermarking For Multimedia” , the notion of security, i.e. the presence of an adversary, was only considered in 1998 with the scenario of the Oracle attack (see Sect. 1.3.3) proposed by...
[This chapter provides different solutions to achieve a security level such as stego-security, subspace-security or key security while minimizing the embedding distortion.]
[This chapter presents different ways to attack watermarking schemes and to estimate the secret key. One of the pioneering key estimation attack  consisted in estimating a set of secret carriers used in Spread Spectrum using Independent Component Analysis. The second section proposes to...
[This chapter concludes this book on Watermarking Security and I hope that the reader will have a better view of the ins and outs of this domain. If watermarking security may look like a cat and mice game that is never ending, we can however state several important conclusions derived for the...
Read and print from thousands of top scholarly journals.
Continue with Facebook
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.