Which directions for asymmetric watermarking?

A perfect asymmetric watermark is what a lot of researchers are looking for. So far, no asymmetric scheme is perfect. We review some the schemes proposed so far. We put an emphasis on classical cryptography to see how it has been and can be used, imitated in the watermarking world.

[1]  T. Furon,et al.  Robustness of asymmetric watermarking technique , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[2]  Stefan Katzenbeisser,et al.  Copyright Protection Protocols Based on Asymmetric Watermarking , 2001 .

[3]  Amos Fiat,et al.  How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.

[4]  Pierre Duhamel,et al.  An Asymmetric Public Detection Watermarking Technique , 1999, Information Hiding.

[5]  Scott Craver Zero Knowledge Watermark Detection , 1999, Information Hiding.

[6]  Jean-Jacques Quisquater,et al.  Biometrics, Access Control, Smart Cards: A not so Simple Combination , 2000, CARDIS.

[7]  Bernd Girod,et al.  Public key watermarking by eigenvectors of linear transforms , 2000, 2000 10th European Signal Processing Conference.

[8]  Bernd Girod,et al.  Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.

[9]  Bernd Girod,et al.  Asymmetric Watermarking Schemes , 2000 .

[10]  Martin F. H. Schuurmans,et al.  Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.

[11]  Imants D. Svalbe,et al.  Key independent watermark detection , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[12]  David Naccache,et al.  How to Copyright a Function? , 1999, Public Key Cryptography.

[13]  Stefan Katzenbeisser,et al.  Security analysis of public key watermarking schemes , 2001, SPIE Optics + Photonics.