An uni ed approach of asymmetric watermarking schemes
نویسندگان
چکیده
Asymmetric schemes belong to second generation of watermarking. Whereas their need and advantage are well understood, many doubts have been raised about their robustness and security. Four di erent asymmetric schemes have been proposed up to now. Whereas they were seemingly relying on completely di erent concepts, they share the same performances. Exploring in detail these concepts, the authors propose a common formulation of the four di erent detector processes. This allows to stress common features about security of asymmetric schemes.
منابع مشابه
Multiresolution Watermarking for Images and Video: A Unified Approach
This paper proposes a uni ed approach to digital watermarking of images and video based on the 2D and 3D discrete wavelet transforms. The hierarchical nature of the wavelet representation allows mutliresolutional detection of the digital watermark, which is a Gaussian distributed random vector added to all the highpass bands in the wavelet domain. We show that, when subjected to distortion from...
متن کاملTwo Novel Chaos-Based Algorithms for Image and Video Watermarking
In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...
متن کاملGENERIC CRSs INFINITE - DOMAIN PROBLEMS FINITE - DOMAIN PROBLEMS
The lack of a uni ed framework for constraint problems has resulted in a diversity of constraint solution techniques and methods for describing constraint problems. A uni ed framework would allow the construction of a kernel constraint engine, capable of solving constraint problems composed of models from di erent domains, such as engineering and geometric problems. As a rst step towards such a...
متن کاملAnalysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack
Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...
متن کاملCLNS 96/1413 Asymmetric Orbifolds and Grand Uni cation
We generalize the rules for the free fermionic string construction to include other asymmetric orbifolds with world-sheet bosons. We use these rules to construct various grand uni ed string models that involve level-3 current algebras. We present the explicit construction of three classes of 3-chiral-family grand uni ed models in the heterotic string theory. Each model has 5 lefthanded, and two...
متن کامل