Nowadays, a popular method used for additive watermarking is wide spread spectrum. It consists in adding a spread signal into the host document. This signal is obtained by the sum...
We consider the problem of information embedding where the encoder modifies a white Gaussian host signal in a power-constrained manner to encode the message, and the decoder recov...
A variety of digital watermarking applications have emerged recently that require the design of systems for embedding one signal (the "embedded signal" or "watermar...
In the integrity checking context of multimedia contents, a malicious user aims at devising a forged content in order to fool a watermarker by making him use as a genuine content....
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
The steganographic security in the Cachin’s work is defined as the statistical invisibility between the host signal and its marked version. At contrary, the robustness to an at...
The theoretical foundations of data hiding have been revealed by formulating the problem as message communication over a noisy channel, i.e. the host document. In light of this de...
In this paper, we analyze the effect of various collusion attacks on fingerprinting systems for compressed multimedia. We evaluate the effectiveness of the collusion attacks in te...
Avinash L. Varna, Shan He, Ashwin Swaminathan, Min...