Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Watermarking SecurityFundamentals

Watermarking Security: Fundamentals [If one of the first paper on digital watermarking published in 1996 was named “Secure Spread Spectrum Watermarking For Multimedia” [1], the notion of security, i.e. the presence of an adversary, was only considered in 1998 with the scenario of the Oracle attack (see Sect. 1.3.3) proposed by Kalker et al. [2]. This attack and possible counter-attacks was afterward studied by Mansour in 2002 [3], Choubassi in 2005 [4], and Comesaña et. al in 2005 [5, 6] (see also Sect. 4.3.5).] http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png

Loading next page...
 
/lp/springer-journals/watermarking-security-fundamentals-j2Lcd0P095
Publisher
Springer Singapore
Copyright
© The Author(s) 2016
ISBN
978-981-10-0505-3
Pages
33 –61
DOI
10.1007/978-981-10-0506-0_3
Publisher site
See Chapter on Publisher Site

Abstract

[If one of the first paper on digital watermarking published in 1996 was named “Secure Spread Spectrum Watermarking For Multimedia” [1], the notion of security, i.e. the presence of an adversary, was only considered in 1998 with the scenario of the Oracle attack (see Sect. 1.3.3) proposed by Kalker et al. [2]. This attack and possible counter-attacks was afterward studied by Mansour in 2002 [3], Choubassi in 2005 [4], and Comesaña et. al in 2005 [5, 6] (see also Sect. 4.3.5).]

Published: Jun 22, 2016

Keywords: Equivalent Region; Watermark Scheme; Watermark Signal; Security Class; Quantization Index Modulation

There are no references for this article.