In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa's dirty paper scheme. We quantify the information about the secret key that leaks from the observation of watermarked signals, using the mutual information as analytic tool for providing a fair comparison between the original Costa's scheme, Distortion Compensated - Dither Modulation and Spread Spectrum. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Pérez-Freire, L., Comesana, P., & Pérez-González, F. (2006). Information-theoretic analysis of security in side-informed data hiding. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3727 LNCS, pp. 131–145). Springer Verlag. https://doi.org/10.1007/11558859_11
Mendeley helps you to discover research relevant for your work.