2000
DOI: 10.1007/10719724_6
|View full text |Cite
|
Sign up to set email alerts
|

Developments in Steganography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2001
2001
2008
2008

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…Although the proposed solution was not at all secure, it stressed the issue that the would-be secret key of DSSS can not remain a secret in some applications. Recently, new asymmetric watermarking schemes have been proposed as an interesting alternative especially for the copy protection framework [24], [25], [26], [27], [28], [29]. Although invented independently, the authors showed that these methods shared the same detection algorithm (i.e.…”
Section: Asymmetric Watermarking Methodsmentioning
confidence: 99%
“…Although the proposed solution was not at all secure, it stressed the issue that the would-be secret key of DSSS can not remain a secret in some applications. Recently, new asymmetric watermarking schemes have been proposed as an interesting alternative especially for the copy protection framework [24], [25], [26], [27], [28], [29]. Although invented independently, the authors showed that these methods shared the same detection algorithm (i.e.…”
Section: Asymmetric Watermarking Methodsmentioning
confidence: 99%
“…Another idea is to embed private key information into a host signal and detect a correlation between the signal and a transformation of the signal using a public key [33]. Other correlation-based public watermarking schemes include [9,30,11]. However, such watermarks can be removed by certain attacks such as a sensitivity attack [6,21] or confusing attack [34].…”
Section: Related Workmentioning
confidence: 99%
“…In [97], Smith and Dodge differentiate also between strong and weak public key watermarking; in the former, performing the extraction with the public key gives no advantage in stripping the watermark above that provided by the access to a watermark reading oracle, while a weak public key only deals with recovering the original image. They also present a very simple asymmetric method based on periodic watermarks.…”
Section: Asymmetric Watermarkingmentioning
confidence: 99%