HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Conference papers

Robustness of an asymmetric technique

Abstract : Asymmetric schemes belong to second generation of watermarking. Whereas their need and advantage are well understood, many doubts have been raised about their robustness. According to a method presented in [1], a very robust symmetric technique is derived into an asymmetric scheme. Tests show that it is as robust as the symmetric version. Yet, asymmetric schemes undergo malicious attacks that confuse the detection process. Tests reveal that the quality loss due to these malicious attacks is too important for the signal to be used after the attack.
Keywords : Watermarking Security
Document type :
Conference papers
Complete list of metadata

Cited literature [5 references]  Display  Hide  Download

Contributor : Teddy Furon Connect in order to contact the contributor
Submitted on : Tuesday, June 20, 2006 - 4:24:45 PM
Last modification on : Friday, April 22, 2022 - 10:48:04 AM
Long-term archiving on: : Monday, April 5, 2010 - 9:40:12 PM


  • HAL Id : inria-00080811, version 1


Teddy Furon, Pierre Duhamel. Robustness of an asymmetric technique. IEEE Int. Conf. on Image Processing, IEEE, Sep 2003, Vancouver, Canada. ⟨inria-00080811⟩



Record views


Files downloads