Security

Data Hiding and Water Marking Security Based on Nested Lattices

Download Now Free registration required

Executive Summary

It has become a difficult task in brining the water marking schemes in the recent days. This leads to a good scope to researchers to concentrate on watermarking security principles. All the parameters of watermarking schemes are treated as public. As in cryptanalysis, the development of practical attacks for finding security keys should be treated as the main concept of security analysis. If the intruder manages to accurately estimate the secret key, then the intruder has total access to the watermarking channel for encoding and decoding the hidden data.

  • Format: PDF
  • Size: 57.8 KB