Unified approach of asymmetric watermarking schemes

Asymmetric schemes belong to second generation of watermarking. Whereas their need and advantage are well understood, many doubts have been raised about their robustness and security. Four different asymmetric schemes have been proposed up to now. Whereas they were seemingly relying on completely different concepts, they share the same performances. Exploring in detail these concepts, the authors propose a common formulation of the four different detector processes. This allows to stress common features about security of asymmetric schemes.

[1]  Bernd Girod,et al.  Asymmetric Watermarking Schemes , 2000 .

[2]  Thomas Mittelholzer,et al.  An Information-Theoretic Approach to Steganography and Watermarking , 1999, Information Hiding.

[3]  Imants D. Svalbe,et al.  Key independent watermark detection , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[4]  Jiri Fridrich,et al.  Robust Digital Watermarking Based on Key-Dependent Basis Functions , 1998, Information Hiding.

[5]  Mauro Barni,et al.  Optimum Decoding of Non-additive Full Frame DFT Watermarks , 1999, Information Hiding.

[6]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[7]  Ingemar J. Cox,et al.  Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[8]  David G. Long,et al.  The probability density of spectral estimates based on modified periodogram averages , 1999, IEEE Trans. Signal Process..

[9]  Nicolas Moreau,et al.  Cyclostationarity-Based Audio Watermarking with Private and Public Hidden Data , 2000 .

[10]  Joshua R. Smith,et al.  Developments in Steganography , 1999, Information Hiding.

[11]  Pierre Duhamel,et al.  An Asymmetric Public Detection Watermarking Technique , 1999, Information Hiding.

[12]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.