Exploiting self-similarities to defeat digital watermarking systems: a case study on still images
Proceedings of the 2004 workshop on Multimedia and security
Assessing motion-coherency in video watermarking
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Steganography in wireless application protocol
IMSA'06 Proceedings of the 24th IASTED international conference on Internet and multimedia systems and applications
A Bootstrap Attack on Digital Watermarks in the Frequency Domain
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Video Watermarking and Benchmarking
Proceedings of the 2007 conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies
A new approach for steganography in Bengali text
Journal of Computational Methods in Sciences and Engineering
Video watermarking based on scene detection and 3D DFT
CSS '07 Proceedings of the Fifth IASTED International Conference on Circuits, Signals and Systems
Novel DWT video watermarking schema
Machine Graphics & Vision International Journal
Practical security analysis of dirty paper trellis watermarking
IH'07 Proceedings of the 9th international conference on Information hiding
Hindi text steganography - An approach to information hiding
Journal of Computational Methods in Sciences and Engineering - Special Supplement Issue in Section A and B: Selected Papers from the ISCA International Conference on Software Engineering and Data Engineering, 2009
NPT based video watermarking with non-overlapping block matching
Transactions on computational science XI
Effectiveness of ST-DM watermarking against intra-video collusion
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
A survey of watermarking security
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Countermeasures for collusion attacks exploiting host signal redundancy
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Perceptual video watermarking in the 3D-DWT domain using a multiplicative approach
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
How to combat block replacement attacks?
IH'05 Proceedings of the 7th international conference on Information Hiding
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Watermarking is not cryptography
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Hi-index | 0.00 |
Watermarking digital video material is usually considered as watermarking a sequence of still images. However, such a frame-by-frame approach is very risky since straightforward embedding strategies can result in poor performance in terms of security i.e., against hostile attacks. As examples, two very common video-watermarking systems will be presented as well as the associated intra-video collusion attacks which defeat them. Then, both watermark modulation and embedding strength modulation will be surveyed to design alternative embedding strategies which exhibit superior performance against such attacks. Nevertheless, it will also be shown that an expert attacker can still construct an effective watermark removal attack. Finally, there will be a discussion to assert whether or not security against intra-video collusion can be achieved with such blind frame-by-frame embedding strategies.