A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Unified approach of asymmetric watermarking schemes
2001
Security and Watermarking of Multimedia Contents III
Asymmetric schemes belong to second generation of watermarking. Whereas their need and advantage are well understood, many doubts have been raised about their robustness and security. Four di erent asymmetric schemes have been proposed up to now. Whereas they were seemingly relying on completely di erent concepts, they share the same performances. Exploring in detail these concepts, the authors propose a common formulation of the four di erent detector processes. This allows to stress common features about security of asymmetric schemes.
doi:10.1117/12.435408
dblp:conf/sswmc/FuronVD01
fatcat:aktia3an3vaovlas7cjfwb23wa