Fundamentals, Secure Designs and Attacks
Type de document :
Autre communication scientifique (congrès sans actes - poster - séminaire...)
Titre :
Watermarking Security
Fundamentals, Secure Designs and Attacks
Fundamentals, Secure Designs and Attacks
Auteur(s) :
Bas, Patrick [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Furon, Teddy [Auteur]
Inria Rennes – Bretagne Atlantique
Cayre, François [Auteur]
GIPSA - Communication Information and Complex Systems [GIPSA-CICS]
Doërr, Gwenaël [Auteur]
Synamedia Technologies France [Rennes]
Mathon, Benjamin [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Furon, Teddy [Auteur]
Inria Rennes – Bretagne Atlantique
Cayre, François [Auteur]
GIPSA - Communication Information and Complex Systems [GIPSA-CICS]
Doërr, Gwenaël [Auteur]
Synamedia Technologies France [Rennes]
Mathon, Benjamin [Auteur]
Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 [CRIStAL]
Éditeur :
Springer Singapore
Date de publication :
2016-06
Mot(s)-clé(s) en anglais :
Zero-Bit Watermarking
Multi-Bit Watermarking
Watermarking Spread Spectrum
Distortion Compensated Quantization Index Modulation
Scalar Costa Scheme (SCS)
Trellis-Based Watermarking
Circular Watermarking
Natural Watermarking
Spread Transform Dither Modulation
Watermarking attack
Multi-Bit Watermarking
Watermarking Spread Spectrum
Distortion Compensated Quantization Index Modulation
Scalar Costa Scheme (SCS)
Trellis-Based Watermarking
Circular Watermarking
Natural Watermarking
Spread Transform Dither Modulation
Watermarking attack
Discipline(s) HAL :
Informatique [cs]/Cryptographie et sécurité [cs.CR]
Résumé en anglais : [en]
This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of ...
Lire la suite >This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.Lire moins >
Lire la suite >This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.Lire moins >
Langue :
Anglais
Audience :
Internationale
Vulgarisation :
Non
Collections :
Source :
Fichiers
- 1
- Accès libre
- Accéder au document