International audienceIt has recently been discovered that using pseudo- random sequences as carriers in spread-spectrum techniques for data-hiding is not at all a sufficient condition for ensuring data- hiding security. Using proper and realistic a priori hypothesis on the messages distribution, it is possible to accurately estimate the secret carriers by casting this estimation problem into a Blind Source Separation problem. After reviewing relevant works on spread-spectrum security for watermarking, we further develop on this topic to introduce the concept of security classes which broaden previous notions in watermarking security and fills the gap with steganography security as defined by Cachin. We define four security classes, namely,...
International audienceWhereas the embedding distortion, the payload and the robustness of digital wa...
This second part focuses on estimation of secret parameters of some practical watermarking technique...
In this thesis, we first study the constraint of security in watermarking. In the WOA (Watermarked c...
International audienceThis paper presents two watermarking schemes that are secure when considering ...
ACMInternational audienceThis paper presents two watermarking schemes that are secure when consideri...
This paper presents two watermarking schemes that are se-cure when considering the Watermarked conte...
IHThis paper presents a spread spectrum (SS) watermarking technique that is secure against carriers ...
International audienceThis article presents a new approach to use secure spread- spectrum watermarki...
This article shows the results obtained when using secure spread-spectrum watermarking on gray-scale...
This article proposes a theory of watermarking security based on a cryptanalysis point of view. The ...
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is...
International audienceThis paper presents the first practical analysis of secure modulations for wat...
Abstract This article shows the results obtained when using secure spread-spectrum watermarking on g...
International audienceWhereas the embedding distortion, the payload and the robustness of digital wa...
This second part focuses on estimation of secret parameters of some practical watermarking technique...
In this thesis, we first study the constraint of security in watermarking. In the WOA (Watermarked c...
International audienceThis paper presents two watermarking schemes that are secure when considering ...
ACMInternational audienceThis paper presents two watermarking schemes that are secure when consideri...
This paper presents two watermarking schemes that are se-cure when considering the Watermarked conte...
IHThis paper presents a spread spectrum (SS) watermarking technique that is secure against carriers ...
International audienceThis article presents a new approach to use secure spread- spectrum watermarki...
This article shows the results obtained when using secure spread-spectrum watermarking on gray-scale...
This article proposes a theory of watermarking security based on a cryptanalysis point of view. The ...
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is...
International audienceThis paper presents the first practical analysis of secure modulations for wat...
Abstract This article shows the results obtained when using secure spread-spectrum watermarking on g...
International audienceWhereas the embedding distortion, the payload and the robustness of digital wa...
This second part focuses on estimation of secret parameters of some practical watermarking technique...
In this thesis, we first study the constraint of security in watermarking. In the WOA (Watermarked c...