Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Watermarking SecurityAttacks

Watermarking Security: Attacks [This chapter presents different ways to attack watermarking schemes and to estimate the secret key. One of the pioneering key estimation attack [1] consisted in estimating a set of secret carriers used in Spread Spectrum using Independent Component Analysis. The second section proposes to estimate more complex secret keys generated from dirty paper watermarking schemes using clustering methods. The third section proposes a security attack on Broken Arrows, the system used during the BOWS2 contest using a subspace estimation approach (see Table 5.1).] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Loading next page...
 
/lp/springer-journals/watermarking-security-attacks-ppjA2MG72d
Publisher
Springer Singapore
Copyright
© The Author(s) 2016
ISBN
978-981-10-0505-3
Pages
103 –122
DOI
10.1007/978-981-10-0506-0_5
Publisher site
See Chapter on Publisher Site

Abstract

[This chapter presents different ways to attack watermarking schemes and to estimate the secret key. One of the pioneering key estimation attack [1] consisted in estimating a set of secret carriers used in Spread Spectrum using Independent Component Analysis. The second section proposes to estimate more complex secret keys generated from dirty paper watermarking schemes using clustering methods. The third section proposes a security attack on Broken Arrows, the system used during the BOWS2 contest using a subspace estimation approach (see Table 5.1).]

Published: Jun 22, 2016

Keywords: Independent Component Analysis; Watermark Scheme; Blind Source Separation; Watermark Signal; Principal Angle

There are no references for this article.