Watermarking security analysis based on information theory | IEEE Conference Publication | IEEE Xplore