Abstract : Asymmetric schemes belong to second generation of watermarking. Whereas their need and advantage are well understood, many doubts have been raised about their robustness. According to a method presented in [1], a very robust symmetric technique is derived into an asymmetric scheme. Tests show that it is as robust as the symmetric version. Yet, asymmetric schemes undergo malicious attacks that confuse the detection process. Tests reveal that the quality loss due to these malicious attacks is too important for the signal to be used after the attack.
https://hal.inria.fr/inria-00080811 Contributor : Teddy FuronConnect in order to contact the contributor Submitted on : Tuesday, June 20, 2006 - 4:24:45 PM Last modification on : Friday, April 22, 2022 - 10:48:04 AM Long-term archiving on: : Monday, April 5, 2010 - 9:40:12 PM