This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.
Keywords
Technology & EngineeringSignals & Signal ProcessingComputersSecuritySciencePhysicsCryptography & EncryptionElectronicsElectricalNetwork SecurityFire ScienceLanguage Arts & DisciplinesLibrary & Information Science
2016Book
Author(s)Patrick Bas, Teddy Furon, François Cayre, Gwenaël Doërr, Benjamin Mathon