A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2012; you can also visit the original URL.
The file type is
This paper presents several watermarking methods preventing the estimation of the secret key by an adversary. The constraints for secure embedding using distribution matching, where the decoding regions rely implicitly on the distribution of the host signal, are first formulated. In order to perform informed coding, different decoding regions are associated with the same message using an appropriate partitioning function. The minimization of the embedding distortion is afterwards casted into andoi:10.1109/icassp.2011.5946865 dblp:conf/icassp/Bas11 fatcat:mr5bufkmtrbthkaoi7k33flyc4