ACMInternational audienceThis paper presents two watermarking schemes that are secure when considering the Watermarked content Only Attack (WOA) framework. The definition of watermark security is first recalled and the distinction between key-security and subspace- security classes for Spread Spectrum (SS) watermarking schemes is presented afterwards. Blind source separation techniques are also recalled as a tool to assess the security of a SS watermarking scheme and prove that classical SS and Improved SS are not secure within the WOA framework. To further illustrate these security issues, we next build on a new watermarking scheme called Natural Watermarking (NW). We prove it to be subspace-secure under specific hypotheses. Natural waterm...
This paper presents a robust approach for spread spectrum (SS) based watermarking process. Unlike th...
Digital watermarking studies have always been driven by the improvement of robustness. Most of artic...
The massive production and easy use of digital media pose new challenges on protecting intellectual ...
International audienceThis paper presents two watermarking schemes that are secure when considering ...
This paper presents two watermarking schemes that are se-cure when considering the Watermarked conte...
IHThis paper presents a spread spectrum (SS) watermarking technique that is secure against carriers ...
International audienceIt has recently been discovered that using pseudo- random sequences as carrier...
This article shows the results obtained when using secure spread-spectrum watermarking on gray-scale...
International audienceThis paper presents the first practical analysis of secure modulations for wat...
International audienceThis article presents a new approach to use secure spread- spectrum watermarki...
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is...
Abstract This article shows the results obtained when using secure spread-spectrum watermarking on g...
This article proposes a theory of watermarking security based on a cryptanalysis point of view. The ...
International audienceWhereas the embedding distortion, the payload and the robustness of digital wa...
This paper presents a robust approach for spread spectrum (SS) based watermarking process. Unlike th...
Digital watermarking studies have always been driven by the improvement of robustness. Most of artic...
The massive production and easy use of digital media pose new challenges on protecting intellectual ...
International audienceThis paper presents two watermarking schemes that are secure when considering ...
This paper presents two watermarking schemes that are se-cure when considering the Watermarked conte...
IHThis paper presents a spread spectrum (SS) watermarking technique that is secure against carriers ...
International audienceIt has recently been discovered that using pseudo- random sequences as carrier...
This article shows the results obtained when using secure spread-spectrum watermarking on gray-scale...
International audienceThis paper presents the first practical analysis of secure modulations for wat...
International audienceThis article presents a new approach to use secure spread- spectrum watermarki...
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is...
Abstract This article shows the results obtained when using secure spread-spectrum watermarking on g...
This article proposes a theory of watermarking security based on a cryptanalysis point of view. The ...
International audienceWhereas the embedding distortion, the payload and the robustness of digital wa...
This paper presents a robust approach for spread spectrum (SS) based watermarking process. Unlike th...
Digital watermarking studies have always been driven by the improvement of robustness. Most of artic...
The massive production and easy use of digital media pose new challenges on protecting intellectual ...