Information-theoretic analysis of security in side-informed data hiding

15Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper a novel theoretical security analysis will be presented for data hiding methods with side-information, based on Costa's dirty paper scheme. We quantify the information about the secret key that leaks from the observation of watermarked signals, using the mutual information as analytic tool for providing a fair comparison between the original Costa's scheme, Distortion Compensated - Dither Modulation and Spread Spectrum. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Pérez-Freire, L., Comesana, P., & Pérez-González, F. (2006). Information-theoretic analysis of security in side-informed data hiding. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3727 LNCS, pp. 131–145). Springer Verlag. https://doi.org/10.1007/11558859_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free