Skip to Main content Skip to Navigation
New interface
Other publications

Watermarking for alternative requirements

Teddy Furon 1 
1 TEMICS - Digital image processing, modeling and communication
IRISA - Institut de Recherche en Informatique et Systèmes Aléatoires, Inria Rennes – Bretagne Atlantique
Abstract : Watermarking is a primitive robustly hiding binary messages in host media. However, some applications needs adaptations of this basic primitive. The aim of this chapter is to detail such possible enrichments. However, this chapter is not only a list of less classical watermarking applications. The relationship between cryptography and watermarking is the base supporting this chapter. Cryptography and watermarking tackles the same issue: computer security (but note that watermarking doesn't only target secure applications). The presented enrichments are largely inspired by known functionalities of cryptography. The differences are sometimes quite subtle but important. It would not make sense that watermarking only mimics functionalities of cryptography whose theoretical and practical security levels are assessed for decades. Therefore, this chapter focuses on the interactions between these two technologies. All cryptographic references in this chapter are taken from Menezes et al. (1996). This chapter makes an overview of four different applications: authentication, fingerprinting, watermarking protocols (embedding and detection), and asymmetric watermarking.
Document type :
Other publications
Complete list of metadata

Cited literature [47 references]  Display  Hide  Download
Contributor : Teddy Furon Connect in order to contact the contributor
Submitted on : Thursday, July 6, 2006 - 12:07:31 PM
Last modification on : Friday, February 4, 2022 - 3:22:01 AM
Long-term archiving on: : Monday, April 5, 2010 - 9:38:09 PM


  • HAL Id : inria-00084268, version 1


Teddy Furon. Watermarking for alternative requirements. 2005. ⟨inria-00084268⟩



Record views


Files downloads