Watermarking Security: Fundamentals
Bas, Patrick; Furon, Teddy; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin
2016-06-22 00:00:00
[If one of the first paper on digital watermarking published in 1996 was named “Secure Spread Spectrum Watermarking For Multimedia” [1], the notion of security, i.e. the presence of an adversary, was only considered in 1998 with the scenario of the Oracle attack (see Sect. 1.3.3) proposed by Kalker et al. [2]. This attack and possible counter-attacks was afterward studied by Mansour in 2002 [3], Choubassi in 2005 [4], and Comesaña et. al in 2005 [5, 6] (see also Sect. 4.3.5).]
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/springer-journals/watermarking-security-fundamentals-j2Lcd0P095
[If one of the first paper on digital watermarking published in 1996 was named “Secure Spread Spectrum Watermarking For Multimedia” [1], the notion of security, i.e. the presence of an adversary, was only considered in 1998 with the scenario of the Oracle attack (see Sect. 1.3.3) proposed by Kalker et al. [2]. This attack and possible counter-attacks was afterward studied by Mansour in 2002 [3], Choubassi in 2005 [4], and Comesaña et. al in 2005 [5, 6] (see also Sect. 4.3.5).]
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.