An uni ed approach of asymmetric watermarking schemes

نویسندگان

  • T. Furon
  • I. Venturini
  • P. Duhamel
چکیده

Asymmetric schemes belong to second generation of watermarking. Whereas their need and advantage are well understood, many doubts have been raised about their robustness and security. Four di erent asymmetric schemes have been proposed up to now. Whereas they were seemingly relying on completely di erent concepts, they share the same performances. Exploring in detail these concepts, the authors propose a common formulation of the four di erent detector processes. This allows to stress common features about security of asymmetric schemes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multiresolution Watermarking for Images and Video: A Unified Approach

This paper proposes a uni ed approach to digital watermarking of images and video based on the 2D and 3D discrete wavelet transforms. The hierarchical nature of the wavelet representation allows mutliresolutional detection of the digital watermark, which is a Gaussian distributed random vector added to all the highpass bands in the wavelet domain. We show that, when subjected to distortion from...

متن کامل

Two Novel Chaos-Based Algorithms for Image and Video Watermarking

In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...

متن کامل

GENERIC CRSs INFINITE - DOMAIN PROBLEMS FINITE - DOMAIN PROBLEMS

The lack of a uni ed framework for constraint problems has resulted in a diversity of constraint solution techniques and methods for describing constraint problems. A uni ed framework would allow the construction of a kernel constraint engine, capable of solving constraint problems composed of models from di erent domains, such as engineering and geometric problems. As a rst step towards such a...

متن کامل

Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack

Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...

متن کامل

CLNS 96/1413 Asymmetric Orbifolds and Grand Uni cation

We generalize the rules for the free fermionic string construction to include other asymmetric orbifolds with world-sheet bosons. We use these rules to construct various grand uni ed string models that involve level-3 current algebras. We present the explicit construction of three classes of 3-chiral-family grand uni ed models in the heterotic string theory. Each model has 5 lefthanded, and two...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000