A survey of watermarking security

被引:0
|
作者
Furon, T [1 ]
机构
[1] TEMICS Project, F-35042 Rennes, France
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Digital watermarking studies have always been driven by the improvement of robustness. Most of articles of this field deal with this criterion, presenting more and more impressive experimental assessments. Some key events in this quest are the use of spread spectrum, the invention of resynchronization schemes, the discovery of side information channel, and the formulation of the opponent actions as a game. On the contrary, security received little attention in the watermarking community. This paper presents a comprehensive overview of this recent topic. We list the typical applications which requires a secure watermarking technique. For each context, a threat analysis is purposed. This presentation allows us to illustrate all the certainties the community has on the subject, browsing all key papers. The end of the paper is devoted to what remains not clear, intuitions and future studies.
引用
收藏
页码:201 / 215
页数:15
相关论文
共 50 条
  • [31] Biometric Template Security based on Watermarking
    Bhatnagar, Gaurav
    Wu, Q. M. Jonathan
    Raman, Balasubramanian
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE AND EXHIBITION ON BIOMETRICS TECHNOLOGY, 2010, 2 : 227 - 235
  • [32] The security performance evaluation of digital watermarking
    Zhang, Xinhong
    Li, Shejiao
    Zhang, Fan
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 762 - 763
  • [33] A Review on Watermarking Techniques for Multimedia Security
    Macit, Huseyin Bilal
    Koyun, Arif
    ARTIFICIAL INTELLIGENCE AND APPLIED MATHEMATICS IN ENGINEERING PROBLEMS, 2020, 43 : 406 - 417
  • [34] Special section on security, steganography, and watermarking
    Dittmann, Jana
    Delp, Edward J.
    JOURNAL OF ELECTRONIC IMAGING, 2006, 15 (04)
  • [35] Network Flow Watermarking: A Survey
    Iacovazzi, Alfonso
    Elovici, Yuval
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (01): : 512 - 530
  • [36] Survey on digital watermarking techniques
    Shukla, Deepti
    Tiwari, Nirupama
    International Journal of Signal Processing, Image Processing and Pattern Recognition, 2015, 8 (09) : 121 - 126
  • [37] A survey on IP watermarking techniques
    Abdel-Hamid, AT
    Tahar, S
    Aboulhamid, EM
    DESIGN AUTOMATION FOR EMBEDDED SYSTEMS, 2004, 9 (03) : 211 - 227
  • [38] Reviews On Watermarking Techniques : A Survey
    Gupta, Sheenu
    Shukla, Manshi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2015, 15 (07): : 51 - 55
  • [39] Digital audio watermarking: Survey
    Alsalami, MAT
    Al-Akaidi, MA
    ESM 2003: 17TH EUROPEAN SIMULATION MULTICONFERENCE: FOUNDATIONS FOR SUCCESSFUL MODELLING & SIMULATION, 2003, : 543 - 556
  • [40] A Survey on IP Watermarking Techniques
    Amr T. Abdel-Hamid
    Sofiéne Tahar
    El Mostapha Aboulhamid
    Design Automation for Embedded Systems, 2004, 9 : 211 - 227