A general framework for robust watermarking security
Signal Processing - Special section: Security of data hiding technologies
A secure watermarking scheme for buyer-seller identification and copyright protection
EURASIP Journal on Applied Signal Processing
Copyright protection protocols for copyright protection issues
WSEAS Transactions on Computer Research
Rational enforcement of digital oblivion
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
Security of DM quantization watermarking schemes: a practical study for digital images
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
The return of the sensitivity attack
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Watermarking attack: security of WSS techniques
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
A spread spectrum watermarking scheme based on periodic clock changes for digital images
IH'05 Proceedings of the 7th international conference on Information Hiding
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Watermarking is not cryptography
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Hi-index | 35.68 |
This paper presents an asymmetric watermarking method as an alternative to classical direct sequence spread spectrum and watermarking Costa (1983) schemes techniques. This new method provides a higher security level against malicious attacks threatening watermarking techniques used for a copy protection purpose. This application, which is quite different from the classical copyright enforcement issue, is extremely challenging as no public algorithm is yet known to be secure enough, and some proposed proprietary techniques have been already hacked. Our method is thus an attempt toward the proof that the Kerckhoff's (1883) principle can be stated in the copy protection framework.