Robustness of an asymmetric technique

Abstract : Asymmetric schemes belong to second generation of watermarking. Whereas their need and advantage are well understood, many doubts have been raised about their robustness. According to a method presented in [1], a very robust symmetric technique is derived into an asymmetric scheme. Tests show that it is as robust as the symmetric version. Yet, asymmetric schemes undergo malicious attacks that confuse the detection process. Tests reveal that the quality loss due to these malicious attacks is too important for the signal to be used after the attack.
Keywords : Watermarking Security
Document type :
Conference papers
Complete list of metadatas

Cited literature [5 references]  Display  Hide  Download

https://hal.inria.fr/inria-00080811
Contributor : Teddy Furon <>
Submitted on : Tuesday, June 20, 2006 - 4:24:45 PM
Last modification on : Monday, June 24, 2019 - 2:36:14 PM
Long-term archiving on : Monday, April 5, 2010 - 9:40:12 PM

Identifiers

  • HAL Id : inria-00080811, version 1

Collections

Citation

Teddy Furon, Pierre Duhamel. Robustness of an asymmetric technique. IEEE Int. Conf. on Image Processing, IEEE, Sep 2003, Vancouver, Canada. ⟨inria-00080811⟩

Share

Metrics

Record views

211

Files downloads

128