Watermarking schemes evaluation
Top Cited Papers
- 1 September 2000
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Signal Processing Magazine
- Vol. 17 (5) , 58-64
- https://doi.org/10.1109/79.879339
Abstract
In this article we have used a duality approach to the watermarking evaluation problem by splitting the evaluation criteria into two (independent) groups: functionality and assurance. The first group represents a set of requirements that can be verified using agreed series of tests; the second is a set of levels to which each functionality is evaluated. These levels go from zero or low to very high. We are investigating how evaluation profiles can be defined for different applications and how importance sampling techniques could be used to evaluate the false alarm rate in an automated way.Keywords
This publication has 8 references indexed in Scilit:
- Watermarking in the real world: an application to DVDPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Fundamental performance limits of power-spectrum condition-compliant watermarksPublished by SPIE-Intl Soc Optical Eng ,2000
- Watermark copy attackPublished by SPIE-Intl Soc Optical Eng ,2000
- Copy protection for DVD videoProceedings of the IEEE, 1999
- Fair benchmark for image watermarking systemsPublished by SPIE-Intl Soc Optical Eng ,1999
- If one watermark is good, are more better?Published by Institute of Electrical and Electronics Engineers (IEEE) ,1999
- Attacks on Copyright Marking SystemsPublished by Springer Nature ,1998
- Transaction Security SystemIBM Systems Journal, 1991