Proceedings of the 12th ACM Workshop on Multimedia and Security 2010
DOI: 10.1145/1854229.1854258
|View full text |Cite
|
Sign up to set email alerts
|

Towards robust and secure watermarking

Abstract: This paper presents yet another attempt towards robust and secure watermarking. Some recent works have looked at this issue first designing new watermarking schemes with a security oriented point of view, and then evaluating their robustness compared to state-of-the-art but unsecure techniques. Our approach is, on contrary, to start from a very robust watermarking technique and to propose changes in order to strengthen its security levels. These changes include the introduction of a security criterion, an embe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 17 publications
(27 reference statements)
0
2
0
Order By: Relevance
“…A constraint receiving more and more attention in watermarking nowadays is the security constraint, defined as "the inability by unauthorized users to have access to the raw watermarking channel" by Kalker [10] and linked with the presence of an adversary [11]- [16]. Watermarking schemes then are required to respect the Kerckhoffs' principle [17] (i.e.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…A constraint receiving more and more attention in watermarking nowadays is the security constraint, defined as "the inability by unauthorized users to have access to the raw watermarking channel" by Kalker [10] and linked with the presence of an adversary [11]- [16]. Watermarking schemes then are required to respect the Kerckhoffs' principle [17] (i.e.…”
Section: Introductionmentioning
confidence: 99%
“…The Kerckhoffs' principle comes from cryptography and cryptanalysis but is also widely used in watermarking [20], [21] or in other forms of data-hiding like steganography [22]- [24]. However, watermarking security analysis shows that an adversary may estimate the secret if he owns a sufficient number of marked contents and if the embedding scheme is not secure [11]- [16]. According to the degree of estimation of the secret, the adversary would be able to erase, modify or copy the embedded message to another host content.…”
Section: Introductionmentioning
confidence: 99%