Digital watermarking
Techniques and Applications of Digital Watermarking and Content Protection
Techniques and Applications of Digital Watermarking and Content Protection
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property
A hybrid SVD-DCT watermarking method based on LPSNR
Pattern Recognition Letters
An SVD-based watermarking scheme for protecting rightful ownership
IEEE Transactions on Multimedia
Comments on "An SVD-based watermarking scheme for protecting rightful Ownership"
IEEE Transactions on Multimedia
Comments on “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership”
IEEE Transactions on Multimedia
A watermarking technique based on one-way hash functions
IEEE Transactions on Consumer Electronics
A digital watermarking scheme based on singular value decomposition
ESCAPE'07 Proceedings of the First international conference on Combinatorics, Algorithms, Probabilistic and Experimental Methodologies
On the security of a hybrid SVD-DCT watermarking method based on LPSNR
PSIVT'11 Proceedings of the 5th Pacific Rim conference on Advances in Image and Video Technology - Volume Part I
Hi-index | 0.00 |
One major application of a watermarking scheme is to protect the copyright of a content owner by embedding the owner's watermark into the content. Recently, two watermarking schemes were proposed by Chang et al. [1, 2], which are based on singular value decomposition (SVD). In this paper, we present attacks on these watermarking schemes and show how the designers' security claims can be invalidated, namely related to robustness and protection of rightful ownership. Our results are the first known attacks on these SVD-based watermarking schemes.