Robustness of asymmetric watermarking technique

被引:12
作者
Furon, T [1 ]
Duhamel, P [1 ]
机构
[1] Thomson Multimedia, Secur Team, F-35510 Cesson Sevigne, France
来源
2000 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS | 2000年
关键词
D O I
10.1109/ICIP.2000.899271
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Asymmetric schemes belong to second generation of watermarking. Whereas their need and advantage are well understood, many doubts have been raised about their robustness. According to a method presented in [1], a very robust symmetric technique is derived into an asymmetric scheme. Tests show that it is as robust as the symmetric version. Yet, asymmetric schemes undergo malicious attacks that confuse the detection process. Tests reveal that the quality loss due to these malicious attacks is too important for the signal to be used after the attack.
引用
收藏
页码:21 / 24
页数:4
相关论文
共 7 条
[1]  
BARTOLINI F, 1998, P IEEE ICIP CHIC ILL
[2]  
CHEN B, 1999, P SPIE SEC WAT MULT
[3]  
COX IJ, 1999, P IEEE JUL, V87
[4]  
DEROSA A, 1999, P 3 INT WORK INF HID
[5]  
EGGERS JJ, 1999, V3D2 WAT WORKSH ERL
[6]  
FURON T, 1999, P 3 INT WORK INF HID
[7]  
VANSCHYNDEL RG, 1999, ICMCS 99 FLOR IT