Digital image processing
An introduction to the mathematical theory of inverse problems
An introduction to the mathematical theory of inverse problems
A DCT-domain system for robust image watermarking
Signal Processing
Robust audio watermarking using perceptual masking
Signal Processing
Handbook of Applied Cryptography
Handbook of Applied Cryptography
On the invertibility of invisible watermarking techniques
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Watermarking Methods for MPEG Encoded Video: Towards Resolving Rightful Ownership
ICMCS '98 Proceedings of the IEEE International Conference on Multimedia Computing and Systems
IEEE Journal on Selected Areas in Communications
Some general methods for tampering with watermarks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
The public watermarking schemes, which do not need the originals in ownership verification, have been proved invertible in nature. However, this paper is to demonstrate that some public but noninvertible schemes exist in the cases of the ill-posed linear embedding or nonlinear embedding. Since attackers have to solve an ill-posed linear or nonlinear system, they have great difficulty dividing a released version into their claimed original data and scaled watermarks, and in the meantime making the latter be the particular adaptive results based on the former. Since the inverted solutions are drastically perturbed and perceptually unacceptable, they can fail to cheat the private schemes. Furthermore, because the owner has the embedded watermark which jointly defines the embedding system, he or she can do the reverse engineering more precisely and ultimately differentiate himself or herself from the attackers in a public scheme, achieving the public but noninvertible schemes.