Vis enkel innførsel

dc.contributor.authorNyeem, Hussain
dc.contributor.authorBoles, Wageeh
dc.contributor.authorBoyd, Colin Alexander
dc.date.accessioned2019-11-01T08:26:44Z
dc.date.available2019-11-01T08:26:44Z
dc.date.created2015-01-20T15:12:57Z
dc.date.issued2014
dc.identifier.citationEURASIP Journal on Advances in Signal Processing. 2014, 2014:135 .nb_NO
dc.identifier.issn1687-6172
dc.identifier.urihttp://hdl.handle.net/11250/2626027
dc.description.abstractWhile formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes is desirable, but at present, their development is usually informal, ad hoc, and omits the complete realization of application scenarios. This practice not only hinders the choice and use of a suitable scheme for a watermarking application, but also leads to debate about the state-of-the-art for different watermarking applications. With a view to the systematic development of watermarking schemes, we present a formal generic model for digital image watermarking. Considering possible inputs, outputs, and component functions, the initial construction of a basic watermarking model is developed further to incorporate the use of keys. On the basis of our proposed model, fundamental watermarking properties are defined and their importance exemplified for different image applications. We also define a set of possible attacks using our model showing different winning scenarios depending on the adversary capabilities. It is envisaged that with a proper consideration of watermarking properties and adversary actions in different image applications, use of the proposed model would allow a unified treatment of all practically meaningful variants of watermarking schemes.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringernb_NO
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleDigital image watermarking: its formal model, fundamental properties and possible attacksnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionpublishedVersionnb_NO
dc.source.pagenumber22nb_NO
dc.source.volume2014:135nb_NO
dc.source.journalEURASIP Journal on Advances in Signal Processingnb_NO
dc.identifier.doi10.1186/1687-6180-2014-135
dc.identifier.cristin1202823
dc.description.localcodeOpen Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal