Designing optimal watermark signal for a stealthy attacker | IEEE Conference Publication | IEEE Xplore