Publication | Closed Access
Watermarking schemes evaluation
581
Citations
7
References
2000
Year
EngineeringEvaluation ProblemInformation SecurityBiometricsVerificationInformation ForensicsSecurity EvaluationEvaluation CriteriaSoftware AnalysisHardware SecurityData ScienceDuality ApproachSchemes EvaluationStatisticsSecurity TestingData PrivacyComputer ScienceData SecurityCryptographyDigital WatermarkingProgram AnalysisSoftware TestingInformation HidingMultimedia SecuritySecurity Measurement
In this article we have used a duality approach to the watermarking evaluation problem by splitting the evaluation criteria into two (independent) groups: functionality and assurance. The first group represents a set of requirements that can be verified using agreed series of tests; the second is a set of levels to which each functionality is evaluated. These levels go from zero or low to very high. We are investigating how evaluation profiles can be defined for different applications and how importance sampling techniques could be used to evaluate the false alarm rate in an automated way.
| Year | Citations | |
|---|---|---|
Page 1
Page 1