Table of contents

Matrix embedding

Cost functions

Machine/Deep Learning attacks

Statistical attacks


  • Watermarking examples: Implementation of some watermarking schemes proposed in the book Digital Watermarking and Steganography by I. J. Cox, M. L. Miller, J. A. Bloom, J. Fridrich and T. Kalker.
    • System 1: E_BLIND/L_LC
      Blind Embedding (E_BLIND) and Linear Correlation Detection (D_LC).
    • System 2: E_FIXED_LC/L_LC
      Fixed Linear Correlation Embedder (E_FIXED_LC) amd Linear Correlation Detection (D_LC).
    • System 3: E_BLK_BLIND/D_BLK_CC
      Block-Based, Blind Embedding (E_BLK_BLIND) and Correlation Coefficient Detection (D_BLK_CC)
    • System 4: E_SIMPLE_8/D_SIMPLE_8
      8-Bit Blind Embedder (E_SIMPLE_8) and 8-Bit Detector (D_SIMPLE_8).
    • System 5: E_TRELLIS_8/D_TRELLIS_8
      Trellis-Coding Embedder (E_TRELLIS_8) and Viterbi Detector (D_TRELLIS_8).