Some general methods for tampering with watermarks
- 1 May 1998
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Journal on Selected Areas in Communications
- Vol. 16 (4) , 587-593
- https://doi.org/10.1109/49.668980
Abstract
Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application is for copyright control, where it is envisaged that digital video recorders will not permit the recording of content that is watermarked as "never copy". In such a scenario, it is important that the watermark survive both normal signal transformations and attempts to remove the watermark so that an illegal copy can be made. We discuss to what extent a watermark can be resistant to tampering and describe a variety of possible attacks.Keywords
This publication has 8 references indexed in Scilit:
- Public watermarks and resistance to tamperingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- A method for signature casting on digital imagesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Secure spread spectrum watermarking for multimediaIEEE Transactions on Image Processing, 1997
- Review of watermarking and the importance of perceptual modelingPublished by SPIE-Intl Soc Optical Eng ,1997
- Techniques for data hidingIBM Systems Journal, 1996
- Computer based steganography: How it works and why therefore any restrictions on cryptography are nonsense, at bestPublished by Springer Nature ,1996
- Watermarking digital images for copyright protectionPublished by Institution of Engineering and Technology (IET) ,1995
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978