• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 226
Next 10 →

Zero-knowledge watermark detector robust to sensitivity attacks

by Juan Ramón Troncosopastoriza - in 8th ACM Multimedia and Security Workshop
"... Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of being attacked by sensitivity attacks, for which zero-knowledge does not provide protection. In this paper a new zero-knowled ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of being attacked by sensitivity attacks, for which zero-knowledge does not provide protection. In this paper a new zero

Secure spread spectrum watermarking for multimedia

by Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, Talal Shamoon - IEEE TRANSACTIONS ON IMAGE PROCESSING , 1997
"... This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gauss ..."
Abstract - Cited by 1100 (10 self) - Add to MetaCart
. In these cases, the watermark detector unambiguously identifies the owner. Further, the use of Gaussian noise, ensures strong resilience to multiple-document, or collusional, attacks. Experimental results are provided to support these claims, along with an exposition of pending open problems.

Title: A Security Risk for Publicly Available Watermark Detectors

by Author Ton Kalker, Ton Kalker
"... this paper we have addressed the issue of watermark security based on the availability of a watermark detector and a single watermarked image. We extended the work started in #5# and #1# by presenting a simple attack method. A slight extension of the theory shows that the same method is applicable t ..."
Abstract - Add to MetaCart
this paper we have addressed the issue of watermark security based on the availability of a watermark detector and a single watermarked image. We extended the work started in #5# and #1# by presenting a simple attack method. A slight extension of the theory shows that the same method is applicable

Efficient Non-Interactive Zero-Knowledge Watermark Detector Robust to Sensitivity Attacks

by Juan Ramón Troncoso, O Pérez-gonzález
"... Zero-knowledge watermark detectors presented to date are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of being attacked by sensitivity attacks, for which zero-knowledge does not provide protection. In this paper, an effi ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Zero-knowledge watermark detectors presented to date are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of being attacked by sensitivity attacks, for which zero-knowledge does not provide protection. In this paper

1 NON-LINEAR WATERMARK DETECTOR EMBEDDED IN FOURIER DOMAIN

by V. Solachidis, I. Pitas
"... This paper deals with the statistical analysis of the behavior of a blind copyright protection watermarking system based on pseudorandom signals embedded in the magnitude of the Fourier transform of the host data. The data can be either one-dimensional (sound), two dimensional (image) or three dimen ..."
Abstract - Add to MetaCart
This paper deals with the statistical analysis of the behavior of a blind copyright protection watermarking system based on pseudorandom signals embedded in the magnitude of the Fourier transform of the host data. The data can be either one-dimensional (sound), two dimensional (image) or three

ADDITIVE WATERMARK DETECTORS BASED ON A NEW HIERARCHICAL SPATIALLY ADAPTIVE IMAGE MODEL

by Antonis Mairgiotis , Nikolaos Galatsanos , Yongi Yang
"... ABSTRACT In this paper we propose a new family of watermark detectors for additive watermarks in digital images. These detectors are based on a recently proposed two-level, hierarchical image model, which was found to be beneficial for image recovery problems. The top level of this model is defined ..."
Abstract - Add to MetaCart
ABSTRACT In this paper we propose a new family of watermark detectors for additive watermarks in digital images. These detectors are based on a recently proposed two-level, hierarchical image model, which was found to be beneficial for image recovery problems. The top level of this model

Electronic Letters on Computer Vision and Image Analysis 4(1):11-20, 2004 Robustness of a Blind Image Watermark Detector Designed by Orthogonal Projection

by Cong Jin, Jiaxiong Peng , 2004
"... Digital watermarking is a key technique practical intellectual property protecting systems and concealment correspondence systems. In this paper, we discussed a blind detection method for the digital image watermark. The theories research show that the orthogonal projection sequence of a digital ima ..."
Abstract - Add to MetaCart
image is one-to-one correspondence with this digital image. By this conclusion, we designed a novel blind watermark detector. In this detector, to calculate the correlation value between the image and watermark, the intensity information of digital image is not used, and the orthogonal projection

Watermark Estimation through Detector Observations

by Ton Kalker - in Proceedings IEEE Benelux Signal Processing Symposium 98 , 1998
"... A watermark is a perceptually unobtrusive signal embedded in an image, an audio or video clip, or any other other multimedia asset. Its purpose is to be a label which is holographically attached to the content. Moreover, it can only be removed by malicious and deliberate attacks #without a great los ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
loss of content quality# if some secret parameter K is known. In contrast, a watermark should be readily detectable by electronic means. This implies that electronic watermark detection is only feasible if the watermark detector is aware of the secret K. In many watermarking business scenarios

Dijk, “Watermark estimation through detector analysis

by Ton Kalker, Jean-paul Linnartx, Marten Dijk - In Proceedings of the ICIP , 1998
"... ABSTRACT tectable by dedicated software or hardware and very A watermark is a perceptually unobtrusiGe signal em-bedded in an image, an audio or video clip, or any other other multimedia asset. Its purpocie is to be a label which is holographically attached to the content. Moreover, it can only be r ..."
Abstract - Cited by 28 (1 self) - Add to MetaCart
be removed by malicious and de-liberate attacks (without a great loss of content qual-ity) if some secret parameter K is known. In con-trast, a watermark should be readily detectable by elec-tronic means. This implies that electronic watermark detection is only feasible if the watermark detector is aware

Informed embedding: Exploiting image and detector information during watermark insertion

by Matt L. Miller, Ingemar J. Cox, Jeffrey A. Bloom - In IEEE International Conference on Image Processing , 2000
"... Usually watermark embedding simply adds a globally or locally attenuated watermark pattern to the cover data (photograph, music, movie). The attenuation is required to maintain fidelity of the cover data to an observer while the watermark detector considers the cover data to be “noise”. We refer to ..."
Abstract - Cited by 43 (6 self) - Add to MetaCart
Usually watermark embedding simply adds a globally or locally attenuated watermark pattern to the cover data (photograph, music, movie). The attenuation is required to maintain fidelity of the cover data to an observer while the watermark detector considers the cover data to be “noise”. We refer
Next 10 →
Results 1 - 10 of 226
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University