“…Several methods have been proposed in the literature to embed and hide fingerprints (watermarks) into different media and, depending on the function they are intended to serve, these watermarks can be invisible or visible [2], [3], [8], [9], [13], [29]. Though most watermarking methods are easy to defeat by collusion attacks, the spread spectrum watermarking method proposed in [9], where the watermarks have a component-wise Gaussian distribution and are statistically independent, was argued to be highly resistant to collusion attacks [9], [15].…”