2015 IEEE International Conference on Digital Signal Processing (DSP) 2015
DOI: 10.1109/icdsp.2015.7251862
|View full text |Cite
|
Sign up to set email alerts
|

On the security of the schur-based watermarking schemes

Abstract: Abstract-This paper presents a security analysis of robust watermarking methods based on Schur decomposition in a general scenario. The security is defined as the difficulty to remove the watermark and to estimate the secrets used in the embedding process, supposing that the adversary possesses several watermarked digital contents. The theoretical analysis and extensive experimental results carried out prove that these schemes fail to secure the digital contents against malicious attacks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…Schur decomposition is a decomposition method of a square matrix into unitary and upper triangular matrices [38,[40][41]. Let be a square matrix ×…”
Section: Schur Decompositionmentioning
confidence: 99%
See 1 more Smart Citation
“…Schur decomposition is a decomposition method of a square matrix into unitary and upper triangular matrices [38,[40][41]. Let be a square matrix ×…”
Section: Schur Decompositionmentioning
confidence: 99%
“…They also used an objective evaluation function (OEF) and fruit fly optimization algorithm (FOA) to obtain the optimal scaling factor and optimal factor of the contradiction or trade-off between imperceptibility and robustness. While the other image watermarking schemes based on the other domains are proposed using lifting wavelet transform (LWT) [2,10,36,37], and Schur decomposition [38][39][40][41].…”
Section: Introduction and Related Workmentioning
confidence: 99%