Watermarking for alternative requirementsReport as inadecuate

Watermarking for alternative requirements - Download this document for free, or read online. Document in PDF available to download.

1 TEMICS - Digital image processing, modeling and communication IRISA - Institut de Recherche en Informatique et Systèmes Aléatoires, Inria Rennes – Bretagne Atlantique

Abstract : Watermarking is a primitive robustly hiding binary messages in host media. However, some applications needs adaptations of this basic primitive. The aim of this chapter is to detail such possible enrichments. However, this chapter is not only a list of less classical watermarking applications. The relationship between cryptography and watermarking is the base supporting this chapter. Cryptography and watermarking tackles the same issue: computer security but note that watermarking doesn-t only target secure applications. The presented enrichments are largely inspired by known functionalities of cryptography. The differences are sometimes quite subtle but important. It would not make sense that watermarking only mimics functionalities of cryptography whose theoretical and practical security levels are assessed for decades. Therefore, this chapter focuses on the interactions between these two technologies. All cryptographic references in this chapter are taken from Menezes et al. 1996. This chapter makes an overview of four different applications: authentication, fingerprinting, watermarking protocols embedding and detection, and asymmetric watermarking.

Keywords : authentication fingerprinting watermarking protocols asymmetric watermarking

Author: Teddy Furon -

Source: https://hal.archives-ouvertes.fr/


Related documents