that the CAR-STDM approach achieves the security
against such kind of BSS attacks, with higher level
of transparency and robustness against AWGN and
Salt&Peper attacks.
As for future enhancements, we plan to execute the
theoretical proof of the security analysis and to in-
clude further improvements by exploring new secure
subspaces to embed the watermark.
ACKNOWLEDGEMENTS
This work is partially funded with support from the
National Council for Scientific Research in Lebanon
CNRS-L, the Hubert Curien CEDRE programme, the
Agence Universitaire de la Francophonie AUF-PCSI
programme, and the Labex ACTION program (con-
tract ANR-11-LABX-01-01).
REFERENCES
Alizadeh-Fahimeh, F., Canceill-Nicolas, N., Dabkiewicz-
Sebastian, S., and Vandevenne-Diederik, D. (2012).
Using steganography to hide messages inside pdf fi-
les. SSN Project Report.
Bas, P. and Hurri, J. (2006). Vulnerability of dm watermar-
king of non-iid host signals to attacks utilising the sta-
tistics of independent components. IEE Proceedings-
Information Security, 153(3):127–139.
Bitar, A. W., Darazi, R., Couchot, J.-F., and Couturier, R.
(2017). Blind digital watermarking in pdf documents
using spread transform dither modulation. Multimedia
Tools and Applications, 76(1):143–161.
Blum, L., Blum, M., and Shub, M. (1986). A simple un-
predictable pseudo-random number generator. SIAM
Journal on computing, 15(2):364–383.
Cao, J. (2014). Improved spread transform dither modu-
lation: a new modulation technique for secure water-
marking. In International Workshop on Digital Water-
marking, pages 399–409. Springer.
Chen, B. and Wornell, G. W. (2001a). Quantization in-
dex modulation: A class of provably good met-
hods for digital watermarking and information em-
bedding. IEEE Transactions on Information Theory,
47(4):1423–1443.
Chen, B. and Wornell, G. W. (2001b). Quantization index
modulation methods for digital watermarking and in-
formation embedding of multimedia. Journal of VLSI
signal processing systems for signal, image and video
technology, 27(1-2):7–33.
Cox, I., Miller, M., Bloom, J., Fridrich, J., and Kalker,
T. (2007). Digital watermarking and steganography.
Morgan Kaufmann.
Cox, I. J., Kilian, J., Leighton, T., and Shamoon, T. (1996).
Secure spread spectrum watermarking for images, au-
dio and video. In Image Processing, 1996. Procee-
dings., International Conference on, volume 3, pages
243–246. IEEE.
Hyvarinen, A. (1999). Fast and robust fixed-point algo-
rithms for independent component analysis. IEEE
transactions on Neural Networks, 10(3):626–634.
Hyv
¨
arinen, A., Karhunen, J., and Oja, E. (2004). Indepen-
dent component analysis, volume 46. John Wiley &
Sons.
Iso, T. (2008). 171/sc 2: Iso 32000–1: 2008 document
management-portable document format-part 1: Pdf
1.7.
Kuribayashi, M., Fukushima, T., and Funabiki, N. (2017).
Data hiding for text document in pdf file. In Interna-
tional Conference on Intelligent Information Hiding
and Multimedia Signal Processing, pages 390–398.
Springer.
Lee, I.-S. and Tsai, W.-H. (2010). A new approach to co-
vert communication via pdf files. Signal processing,
90(2):557–565.
Lin, H.-F., Lu, L.-W., Gun, C.-Y., and Chen, C.-Y. (2013).
A copyright protection scheme based on pdf. Int J
Innov Comput Inf Control, 9(1):1–6.
Por, L. Y. and Delina, B. (2008). Information hiding: A new
approach in text steganography. In WSEAS Internatio-
nal Conference. Proceedings. Mathematics and Com-
puters in Science and Engineering, number 7. World
Scientific and Engineering Academy and Society.
Wang, C. and Tsai, W. (2008). Data hiding in pdf fi-
les and applications by imperceivable modifications of
pdf object parameters. In Proceedings of 2008 Confe-
rence on Computer Vision, Graphics and Image Pro-
cessing, Ilan, Taiwan, Republic of China. Asia Uni-
versity.
Blind PDF Document Watermarking Robust Against PCA and ICA Attacks
427