Skip to main content

Conclusions and Open Problems

  • Chapter
  • First Online:
Watermarking Security

Part of the book series: SpringerBriefs in Electrical and Computer Engineering ((BRIEFSSIGNAL))

  • 523 Accesses

Abstract

This chapter concludes this book on Watermarking Security and I hope that the reader will have a better view of the ins and outs of this domain. If watermarking security may look like a cat and mice game that is never ending, we can however state several important conclusions derived for the large variety of researches that have been conducted but there are also fascinating related problems that still need to be solved. The goal of this last chapter is to list the different outputs and open questions related to watermarking security but also general security of information forensics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wyner AD (1975) The wire-tap channel. Bell Syst Tech J 54(8):1355–1387

    Article  MathSciNet  MATH  Google Scholar 

  2. Ozarow LH, Wyner AD (1984) Wire-tap channel. II. AT & T Bell Lab Tech J 63(10):2135–2157

    MATH  Google Scholar 

  3. Lowd D, Meek C (2005) Adversarial learning. In: Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining. ACM, pp 641–647

    Google Scholar 

  4. Barni M, Pérez-González F (2013) Coping with the enemy: advances in adversary-aware signal processing. In: Proceedings of IEEE international conferenceon acoustic, speech, and signal processing

    Google Scholar 

  5. Furon T, Bas P (2008) Broken arrows. EURASIP J Inf Sec 2008:1–13. ISSN 1687–4161

    Google Scholar 

  6. Linnartz JP, van Dijk M (1998) Analysis of the sensitivity attack against electronic watermarks in images. International information hiding workshop

    Google Scholar 

  7. Herley C (2002) Why watermarking is nonsense. Signal Process Mag IEEE 19(5):10–11

    Article  Google Scholar 

  8. Moulin P (2003) Comments on “Why watermarking is nonsense”. Signal Process Mag IEEE 20(6):57–59

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patrick Bas .

Rights and permissions

Reprints and permissions

Copyright information

© 2016 The Author(s)

About this chapter

Cite this chapter

Bas, P., Furon, T., Cayre, F., Doërr, G., Mathon, B. (2016). Conclusions and Open Problems. In: Watermarking Security. SpringerBriefs in Electrical and Computer Engineering(). Springer, Singapore. https://doi.org/10.1007/978-981-10-0506-0_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-0506-0_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-0505-3

  • Online ISBN: 978-981-10-0506-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics