Robustness of an asymmetric technique

Abstract : Asymmetric schemes belong to second generation of watermarking. Whereas their need and advantage are well understood, many doubts have been raised about their robustness. According to a method presented in [1], a very robust symmetric technique is derived into an asymmetric scheme. Tests show that it is as robust as the symmetric version. Yet, asymmetric schemes undergo malicious attacks that confuse the detection process. Tests reveal that the quality loss due to these malicious attacks is too important for the signal to be used after the attack.
Keywords : Watermarking Security
Type de document :
Communication dans un congrès
IEEE Int. Conf. on Image Processing, Sep 2003, Vancouver, Canada, 2003
Liste complète des métadonnées

Littérature citée [5 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/inria-00080811
Contributeur : Teddy Furon <>
Soumis le : mardi 20 juin 2006 - 16:24:45
Dernière modification le : jeudi 19 juillet 2018 - 12:16:10
Document(s) archivé(s) le : lundi 5 avril 2010 - 21:40:12

Fichier

Identifiants

  • HAL Id : inria-00080811, version 1

Collections

Citation

Teddy Furon, Pierre Duhamel. Robustness of an asymmetric technique. IEEE Int. Conf. on Image Processing, Sep 2003, Vancouver, Canada, 2003. 〈inria-00080811〉

Partager

Métriques

Consultations de la notice

201

Téléchargements de fichiers

108