Unified approach of asymmetric watermarking schemes

Teddy Furon, Ilaria Venturini, Pierre Duhamel, Ping W. Wong, Edward J. Delp III
2001 Security and Watermarking of Multimedia Contents III  
Asymmetric schemes belong to second generation of watermarking. Whereas their need and advantage are well understood, many doubts have been raised about their robustness and security. Four di erent asymmetric schemes have been proposed up to now. Whereas they were seemingly relying on completely di erent concepts, they share the same performances. Exploring in detail these concepts, the authors propose a common formulation of the four di erent detector processes. This allows to stress common features about security of asymmetric schemes.
doi:10.1117/12.435408 dblp:conf/sswmc/FuronVD01 fatcat:aktia3an3vaovlas7cjfwb23wa