Abstract
This book couldn’t have been written without a collaborative work between the main author (Patrick Bas) and his colleagues.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
References
Verance (2010) Cinavia Technologie. http://www.cinavia.com
Prigent N, Karroumi M, Chauvin M, Eluard M, Maetz Y, France TRD (2007) AACS, nouveau standard de protection des contenus pré-enregistrés haute-définition
Jin H, Lotspiech J (2008) Renewable traitor tracing: a trace-revoke-trace system for anonymous attack. Comput Secur-ESORICS 2007:563–577
Nakashima Y, Tachibana R, Babaguchi N (2009) Watermarked movie soundtrack finds the position of the camcorder in a theater. IEEE Trans Multimed 11(3):443–454.ISSN 1520-9210
Benichou D (2009) The seven cybercriminal families (invited speaker). In: IEEE international workshop on information forensics and security
Grimes R (2011) Your guide to the seven types of malicious hackers. http://www.infoworld.com/d/security-central/your-guide-the-seven-types-malicious-hackers-636?source=IFWNLE_nlt_sec_2011-02-08. Feb 2011
Cayre F, Fontaine C, Furon T (2005) Watermarking security: theory and practice. IEEE Trans Signal Process. Special issue Supplement on Secure Media II 53:3976–3987 (2005)
Linnartz J-P, van Dijk M (1998) Analysis of the sensitivity attack against electronic watermarks in images. In: International information hiding workshop
Pérez-Freire L, Pérez-González F, Furon T (2006) On achievable security levels for lattice data hiding in the known message attack scenario. In: 8th ACM multimedia and security workshop. Geneva, Switzerland, pp 68–79, Sep 2006 (accepted)
Pérez-Freire L, Pérez-Gonzalez F (2009) Spread spectrum watermarking security. IEEE Trans Inf Forensics Secur 4(1):2–24
Vila-Forcén JE, Voloshynovskiy S, Koval O, Pérez-González F, Pun T (2005) Worst case additive attack against quantization-based data-hiding methods. In: Edward J Delp III, Wong PW (eds) Security, steganography, and watermarking of multimedia contents VII. San Jose, California, USA: SPIE, Jan 2005
Comesaña P, Freire LP, Pérez-González F (2006) Blind Newton sensitivity attack. IEE Proc Inf Secur 153(3):115–125
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2016 The Author(s)
About this chapter
Cite this chapter
Bas, P., Furon, T., Cayre, F., Doërr, G., Mathon, B. (2016). General Introduction. In: Watermarking Security. SpringerBriefs in Electrical and Computer Engineering(). Springer, Singapore. https://doi.org/10.1007/978-981-10-0506-0_1
Download citation
DOI: https://doi.org/10.1007/978-981-10-0506-0_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-0505-3
Online ISBN: 978-981-10-0506-0
eBook Packages: EngineeringEngineering (R0)