Share Email Print

Proceedings Paper

Unified approach of asymmetric watermarking schemes
Author(s): Teddy Furon; Ilaria Venturini; Pierre Duhamel
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Asymmetric schemes belong to second generation of watermarking. Whereas their need and advantage are well understood, many doubts have been raised about their robustness and security. Four different asymmetric schemes have been proposed up to now. Whereas they were seemingly relying on completely different concepts, they share the same performances. Exploring in detail these concepts, the authors propose a common formulation of the four different detector processes. This allows to stress common features about security of asymmetric schemes.

Paper Details

Date Published: 1 August 2001
PDF: 11 pages
Proc. SPIE 4314, Security and Watermarking of Multimedia Contents III, (1 August 2001); doi: 10.1117/12.435408
Show Author Affiliations
Teddy Furon, Thomson Multimedia Security Lab. (Belgium)
Ilaria Venturini, Ecole Nationale Superieure des Telecommunications (France)
Pierre Duhamel, Ecole Nationale Superieure des Telecommunications (France)

Published in SPIE Proceedings Vol. 4314:
Security and Watermarking of Multimedia Contents III
Ping Wah Wong; Edward J. Delp, Editor(s)

© SPIE. Terms of Use
Back to Top