DocumentCode :
2828338
Title :
Robustness of asymmetric watermarking technique
Author :
Furon, Teddy ; Duhamel, Pierre
Author_Institution :
Multimedia, THOMSON, France
Volume :
3
fYear :
2000
fDate :
2000
Firstpage :
21
Abstract :
Asymmetric schemes belong to second generation of watermarking. Whereas their need and advantage are well understood, many doubts have been raised about their robustness. According to a method presented by Furon and Duhamel (see Proc. of the 3rd Int. Work. on Information Hiding, Dresden, 1999), a very robust symmetric technique is derived into an asymmetric scheme. Tests show that it is as robust as the symmetric version. Yet, asymmetric schemes undergo malicious attacks that confuse the detection process. Tests reveal that the quality loss due to these malicious attacks is too important for the signal to be used after the attack
Keywords :
copy protection; copyright; data compression; image coding; security of data; visual perception; asymmetric schemes; asymmetric watermarking; consumer electronic devices; copy protection system; detection process; human perception model; image coding; malicious attacks; quality loss; robust symmetric technique; robustness; Consumer electronics; Data mining; Detectors; Discrete Fourier transforms; National security; Protection; Public key; Robustness; Testing; Watermarking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Image Processing, 2000. Proceedings. 2000 International Conference on
Conference_Location :
Vancouver, BC
ISSN :
1522-4880
Print_ISBN :
0-7803-6297-7
Type :
conf
DOI :
10.1109/ICIP.2000.899271
Filename :
899271
Link To Document :
بازگشت