next up previous
Next: Bibliography Up: An analysis of one Previous: Generalization

Conclusion

We have presented the analysis of one of the schemes proposed by the SDMI consortium, and have shown how to defeat it. We have also underlined that the security of many watermarking schemes rely not only on the secrecy of the mark but on the secrecy of the algorithm itself, and consequently that they are not suited for distribution.



Julien Stern 2001-01-05