This paper presents two watermarking schemes that are se-cure when considering the Watermarked content Only At-tack (WOA) framework. The definition of watermark secu-rity is first recalled and the distinction between key-security and subspace-security classes for Spread Spectrum (SS) wa-termarking schemes is presented afterwards. Blind source separation techniques are also recalled as a tool to assess the security of a SS watermarking scheme and prove that clas-sical SS and Improved SS are not secure within the WOA framework. To further illustrate these security issues, we next build on a new watermarking scheme called Natural Watermarking (NW). We prove it to be subspace-secure under specific hypotheses. Natural watermarking does not chang...
The massive production and easy use of digital media pose new challenges on protecting intellectual ...
In this thesis, we first study the constraint of security in watermarking. In the WOA (Watermarked c...
Abstract Here, we propose a new method for the watermarking to withstand the geometric attacks, whi...
International audienceThis paper presents two watermarking schemes that are secure when considering ...
ACMInternational audienceThis paper presents two watermarking schemes that are secure when consideri...
IHThis paper presents a spread spectrum (SS) watermarking technique that is secure against carriers ...
International audienceIt has recently been discovered that using pseudo- random sequences as carrier...
This article shows the results obtained when using secure spread-spectrum watermarking on gray-scale...
International audienceThis paper presents the first practical analysis of secure modulations for wat...
International audienceThis article presents a new approach to use secure spread- spectrum watermarki...
Abstract This article shows the results obtained when using secure spread-spectrum watermarking on g...
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is...
This paper presents a robust approach for spread spectrum (SS) based watermarking process. Unlike th...
International audienceWhereas the embedding distortion, the payload and the robustness of digital wa...
This article proposes a theory of watermarking security based on a cryptanalysis point of view. The ...
The massive production and easy use of digital media pose new challenges on protecting intellectual ...
In this thesis, we first study the constraint of security in watermarking. In the WOA (Watermarked c...
Abstract Here, we propose a new method for the watermarking to withstand the geometric attacks, whi...
International audienceThis paper presents two watermarking schemes that are secure when considering ...
ACMInternational audienceThis paper presents two watermarking schemes that are secure when consideri...
IHThis paper presents a spread spectrum (SS) watermarking technique that is secure against carriers ...
International audienceIt has recently been discovered that using pseudo- random sequences as carrier...
This article shows the results obtained when using secure spread-spectrum watermarking on gray-scale...
International audienceThis paper presents the first practical analysis of secure modulations for wat...
International audienceThis article presents a new approach to use secure spread- spectrum watermarki...
Abstract This article shows the results obtained when using secure spread-spectrum watermarking on g...
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is...
This paper presents a robust approach for spread spectrum (SS) based watermarking process. Unlike th...
International audienceWhereas the embedding distortion, the payload and the robustness of digital wa...
This article proposes a theory of watermarking security based on a cryptanalysis point of view. The ...
The massive production and easy use of digital media pose new challenges on protecting intellectual ...
In this thesis, we first study the constraint of security in watermarking. In the WOA (Watermarked c...
Abstract Here, we propose a new method for the watermarking to withstand the geometric attacks, whi...