• Publications
  • Influence
Information hiding-a survey
Information-hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptibleExpand
  • 2,545
  • 85
  • Open Access
On the limits of steganography
In this paper, we clarify what steganography is and what it can do. We contrast it with the related disciplines of cryptography and traffic security, present a unified terminology agreed at the firstExpand
  • 1,331
  • 59
  • Open Access
Attacks on Copyright Marking Systems
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe someExpand
  • 978
  • 53
  • Open Access
Watermarking schemes evaluation
In this article we have used a duality approach to the watermarking evaluation problem by splitting the evaluation criteria into two (independent) groups: functionality and assurance. The first groupExpand
  • 603
  • 36
Fair benchmark for image watermarking systems
Since the early 90s a number of papers on 'robust' digital watermarking systems have been presented but none of them uses the same robustness criteria. This is not practical at all for comparison andExpand
  • 603
  • 36
  • Open Access
A First Look at Identity Management Schemes on the Blockchain
The emergence of distributed ledger technology (DLT) based on a blockchain data structure has given rise to new approaches to identity management that aim to upend dominant approaches to providingExpand
  • 109
  • 13
  • Open Access
Defining security in steganographic systems
Intuitively, the security of a steganographic communication between two principals lies in the inability of an eavesdropper to distinguish cover-objects from stego-objects, that is objects whichExpand
  • 96
  • 9
Evaluation of copyright marking systems
Hidden copyright marks have been proposed as a solution for solving the illegal copying and proof of ownership problems in the context of multimedia objects. Many systems have been proposed, but itExpand
  • 213
  • 8
  • Open Access
Fair evaluation methods for image watermarking systems
Since the early 1990s a number of papers on ''robust'' digital watermarking systems have been presented but none of them uses the same robustness criteria. This is not practical at all for comparisonExpand
  • 57
  • 7
  • Open Access
StirMark benchmark: audio watermarking attacks
We briefly present the architecture of a public automated evaluation service we are developing for still images, sound and video. We also detail new tests that will be included in this platform. TheExpand
  • 122
  • 6
  • Open Access