2008
DOI: 10.1109/tifs.2007.916006
|View full text |Cite
|
Sign up to set email alerts
|

Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding

Abstract: Abstract-It has recently been discovered that using pseudorandom sequences as carriers in spread-spectrum techniques for data-hiding is not at all a sufficient condition for ensuring datahiding security. Using proper and realistic a priori hypothesis on the messages distribution, it is possible to accurately estimate the secret carriers by casting this estimation problem into a Blind Source Separation problem. After reviewing relevant works on spread-spectrum security for watermarking, we further develop on th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
100
0

Year Published

2008
2008
2015
2015

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 77 publications
(101 citation statements)
references
References 36 publications
(56 reference statements)
1
100
0
Order By: Relevance
“…α ISS (i, x) and λ ISS (x) are computed to achieve host-interference rejection and error probability minimization given a target W CR and N CR: In the WOA framework, following the classification of [8], this modulation is insecure. Adversaries are able to estimate the carriers for example by ICA [16], provided that they can gather enough contents.…”
Section: Improved Spread-spectrum (Iss)mentioning
confidence: 99%
See 1 more Smart Citation
“…α ISS (i, x) and λ ISS (x) are computed to achieve host-interference rejection and error probability minimization given a target W CR and N CR: In the WOA framework, following the classification of [8], this modulation is insecure. Adversaries are able to estimate the carriers for example by ICA [16], provided that they can gather enough contents.…”
Section: Improved Spread-spectrum (Iss)mentioning
confidence: 99%
“…However, if this solution is adopted, one has also to take into account the possible security of the embedding method. The design of fingerprinting codes has been studied in various works [2,3,4,5,6] and the security analysis of watermarking schemes has also been investigated [7,8] but outside of the fingerprinting framework. In the sequel, we study the impact of the use of secure embeddings in the context of fingerprinting using spread-spectrum methods and present dedicated collusion strategies.…”
Section: Introductionmentioning
confidence: 99%
“…This shows clearly an important increases of the variance within the secret subspace, consequently the strategy that is developed in this section is to estimate the subspace spanned by the vectors {ci} by estimating the components of important variances from the observations. If such similar strategies have already been used for security analysis of watermarking systems [5,2,12], the estimation of the secret subspace in our case is challenging for different reasons:…”
Section: A Subspace Estimation Approachmentioning
confidence: 99%
“…• Contrary to the systems addressed in [5,2,12], the proposed method used a secret subspace of large dimension (30) in order to avoid basis estimation techniques such as averaging,…”
Section: A Subspace Estimation Approachmentioning
confidence: 99%
See 1 more Smart Citation