Digital watermarking
Zero-Knowledge Watermark Detection and Proof of Ownership
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Blind watermarking applied to image authentication
ICASSP '01 Proceedings of the Acoustics, Speech, and Signal Processing, 2001. on IEEE International Conference - Volume 03
Fundamentals of data hiding security and their application to spread-spectrum analysis
IH'05 Proceedings of the 7th international conference on Information Hiding
An asymmetric watermarking method
IEEE Transactions on Signal Processing
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
IEEE Transactions on Image Processing
On reversibility of random binning based data-hiding techniques: security perspectives
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
A Bootstrap Attack on Digital Watermarks in the Frequency Domain
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
On reliability and security of randomized detectors against sensitivity analysis attacks
IEEE Transactions on Information Forensics and Security
Transactions on data hiding and multimedia security III
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Efficient implementation of zero-knowledge proofs for watermark detection in multimedia data
Transactions on Data Hiding and Multimedia Security I
Hi-index | 0.01 |
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum attacking distortion. This paper is intended as a tutorial on this problem, presenting an overview of previous research and introducing a new method based on a general formulation. This new method does not require any knowledge about the detection function nor any other system parameter, but just the binary output of the detector, being suitable for attacking most known watermarking methods. Finally, the soundness of this new approach is tested by attacking several of those methods.