Skip to main content

General Introduction

  • Chapter
  • First Online:
Watermarking Security

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSSIGNAL))

  • 541 Accesses

Abstract

This book couldn’t have been written without a collaborative work between the main author (Patrick Bas) and his colleagues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    www.cinavia.com.

  2. 2.

    http://en.wikipedia.org/wiki/Carmine_Caridi.

  3. 3.

    http://www.fastcompany.com/1722925/greys-anatomy-goes-dual-screen-thursday-with-this-sync-ipad-app.

  4. 4.

    https://www.digimarc.com/discover/.

  5. 5.

    http://www.wired.com/threatlevel/2011/04/playstation_hack/.

  6. 6.

    http://www.guardian.co.uk/technology/2011/jun/16/lulzsec-anonymous-hacking-games-companies.

  7. 7.

    http://www.zdnet.com/news/wikileaks-hackers-attack-visa-get-banned-by-facebook-twitter/490442.

  8. 8.

    http://www.zdnet.com.au/wikileaks-hit-with-ddos-attack-339307578.htm.

  9. 9.

    http://fr.wikipedia.org/wiki/Stuxnet.

  10. 10.

    http://www.wired.com/gadgetlab/2007/10/a-brief-history/#more-6146.

  11. 11.

    http://fr.wikipedia.org/wiki/ISO/CEI_27005.

  12. 12.

    http://en.wikipedia.org/wiki/Kerckhoffs’s_Principle.

  13. 13.

    http://bows2.ec-lille.fr/.

References

  1. Verance (2010) Cinavia Technologie. http://www.cinavia.com

  2. Prigent N, Karroumi M, Chauvin M, Eluard M, Maetz Y, France TRD (2007) AACS, nouveau standard de protection des contenus pré-enregistrés haute-définition

    Google Scholar 

  3. Jin H, Lotspiech J (2008) Renewable traitor tracing: a trace-revoke-trace system for anonymous attack. Comput Secur-ESORICS 2007:563–577

    Google Scholar 

  4. Nakashima Y, Tachibana R, Babaguchi N (2009) Watermarked movie soundtrack finds the position of the camcorder in a theater. IEEE Trans Multimed 11(3):443–454.ISSN 1520-9210

    Google Scholar 

  5. Benichou D (2009) The seven cybercriminal families (invited speaker). In: IEEE international workshop on information forensics and security

    Google Scholar 

  6. Grimes R (2011) Your guide to the seven types of malicious hackers. http://www.infoworld.com/d/security-central/your-guide-the-seven-types-malicious-hackers-636?source=IFWNLE_nlt_sec_2011-02-08. Feb 2011

  7. Cayre F, Fontaine C, Furon T (2005) Watermarking security: theory and practice. IEEE Trans Signal Process. Special issue Supplement on Secure Media II 53:3976–3987 (2005)

    Google Scholar 

  8. Linnartz J-P, van Dijk M (1998) Analysis of the sensitivity attack against electronic watermarks in images. In: International information hiding workshop

    Google Scholar 

  9. Pérez-Freire L, Pérez-González F, Furon T (2006) On achievable security levels for lattice data hiding in the known message attack scenario. In: 8th ACM multimedia and security workshop. Geneva, Switzerland, pp 68–79, Sep 2006 (accepted)

    Google Scholar 

  10. Pérez-Freire L, Pérez-Gonzalez F (2009) Spread spectrum watermarking security. IEEE Trans Inf Forensics Secur 4(1):2–24

    Article  Google Scholar 

  11. Vila-Forcén JE, Voloshynovskiy S, Koval O, Pérez-González F, Pun T (2005) Worst case additive attack against quantization-based data-hiding methods. In: Edward J Delp III, Wong PW (eds) Security, steganography, and watermarking of multimedia contents VII. San Jose, California, USA: SPIE, Jan 2005

    Google Scholar 

  12. Comesaña P, Freire LP, Pérez-González F (2006) Blind Newton sensitivity attack. IEE Proc Inf Secur 153(3):115–125

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patrick Bas .

Rights and permissions

Reprints and permissions

Copyright information

© 2016 The Author(s)

About this chapter

Cite this chapter

Bas, P., Furon, T., Cayre, F., Doërr, G., Mathon, B. (2016). General Introduction. In: Watermarking Security. SpringerBriefs in Electrical and Computer Engineering(). Springer, Singapore. https://doi.org/10.1007/978-981-10-0506-0_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0506-0_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0505-3

  • Online ISBN: 978-981-10-0506-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics