Watermarking protocol compatible with secret algorithms for resisting invertibility attack

  • Authors:
  • Xinpeng Zhang;Shuozhong Wang

  • Affiliations:
  • School of Communication and Information Engineering, Shanghai University, Shanghai, P.R. China;School of Communication and Information Engineering, Shanghai University, Shanghai, P.R. China

  • Venue:
  • KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Invertibility attack is a hostile measure to breach watermarking systems. In this paper, a novel watermarking protocol using a one-way hash function and a check of random watermarks is proposed in order to combat invertibility attacks. The described technique can be used in conjunction with any watermarking algorithm, no matter it is kept secret or made public, without resorting to a third party jury as required by some previous approaches. By introducing a set of reference sequences, segmentation of the digital information and iterative computation of watermarks, the protocol is further enhanced so that it can resist more sophisticated types of attack based on forging an illegitimate detector.