Watermarking algorithm based on a human visual model
Signal Processing
Resistance of orthogonal Gaussian fingerprints to collusion attacks
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 2
A note on the limits of collusion-resistant watermarks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
A new inter-frame collusion attack and a countermeasure
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
A survey of watermarking security
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Countermeasures for collusion attacks exploiting host signal redundancy
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Fingerprinting schemes. identifying the guilty sources using side information
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Practical data-hiding: additive attacks performance analysis
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
The return of the sensitivity attack
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Security pitfalls of frame-by-frame approaches to video watermarking
IEEE Transactions on Signal Processing - Part II
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Design and statistical analysis of a hash-aided image watermarking system
IEEE Transactions on Image Processing
Forensic analysis of nonlinear collusion attacks for multimedia fingerprinting
IEEE Transactions on Image Processing
Digital watermarking robust to geometric distortions
IEEE Transactions on Image Processing
Multiresolution watermarking for images and video
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
In this paper, we propose five simple algorithms to execute a collusion attack given several watermarked documents. Each document considered is a picture represented as a matrix of two dimensional Discrete Cosine Transform (DCT2) coefficients. Our algorithm is independent of media type. Bootstrap methods are used to construct confidence intervals for each DCT2 coefficient and determine its uncertainty. Using simulation studies we show that Bootstrap procedures are highly efficient with respect to the number of iterations and sample size per iteration while maintaining stellar probabilistic coverage, providing results at least as good as averaging or taking the median of signals. Most importantly, a set of simulation studies suggest that the precision of our heuristic methodology increases quickly when the number of watermarked copies are increased, but good probabilistic coverage is achieved with a low number of independently watermarked copies. We conjecture that the Bootstrap methodology will be highly effective in reconstructing the original signal for documents with high redundancy.