HAL will be down for maintenance from Friday, June 10 at 4pm through Monday, June 13 at 9am. More information
Skip to Main content Skip to Navigation
Conference papers

An unified approach of asymmetric watermarking schemes

Abstract : Asymmetric schemes belong to second generation of watermarking. Whereas their need and advantage are well understood, many doubts have been raised about their robustness and security. Four different asymmetric schemes have been proposed up to now. Whereas they were seemingly relying on completely different concepts, they share the same performances. Exploring in detail these concepts, the authors propose a common formulation of the four different detector processes. This allows to stress common features about security of asymmetric schemes.
Keywords : Watermarking Security
Document type :
Conference papers
Complete list of metadata

Contributor : Teddy Furon Connect in order to contact the contributor
Submitted on : Tuesday, June 20, 2006 - 4:35:36 PM
Last modification on : Friday, April 22, 2022 - 10:48:04 AM
Long-term archiving on: : Monday, April 5, 2010 - 11:10:34 PM


  • HAL Id : inria-00080814, version 1


Teddy Furon, Ilaria Venturini, Pierre Duhamel. An unified approach of asymmetric watermarking schemes. Security and Watermarking of Multimedia Contents III, SPIE, 2001, San Jose, CA, United States. ⟨inria-00080814⟩



Record views


Files downloads