Opportunities for watermarking standards
Communications of the ACM
Proceedings of the 26th annual conference on Computer graphics and interactive techniques
Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
An image watermarking technique using pyramid transform
MULTIMEDIA '01 Proceedings of the ninth ACM international conference on Multimedia
Embedding robust gray-level watermark in an image using discrete cosine transformation
Distributed multimedia databases
Future mulitmedia databases and research directions
Distributed multimedia databases
Digital image watermarking based on discrete wavelet transform
Journal of Computer Science and Technology
Managing Copyright in Open Networks
IEEE Internet Computing
Protecting Digital-Image Copyrights: A Framework
IEEE Computer Graphics and Applications
The first 50 years of electronic watermarking
EURASIP Journal on Applied Signal Processing - Emerging applications of multimedia data hiding
WAIM '02 Proceedings of the Third International Conference on Advances in Web-Age Information Management
A Practical Method for Watermarking Java Programs
COMPSAC '00 24th International Computer Software and Applications Conference
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Evaluation of the Image Degradation for a Typical Watermarking Algorithm in the Block-DCT Domain
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
Zero-Knowledge Watermark Detection and Proof of Ownership
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
Highly Robust Image Watermarking Using Complementary Modulations
ISW '99 Proceedings of the Second International Workshop on Information Security
Sign Correlation Detector for Blind Image Watermarking in the DCT Domain
PCM '01 Proceedings of the Second IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Hiding Functions and Computational Security of Image Watermarking Systems
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
A Robust Digital Watermarking Based on a Statistic Approach
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Watermarking applications and their properties
ITCC '00 Proceedings of the The International Conference on Information Technology: Coding and Computing (ITCC'00)
Watermarking schemes provably secure against copy and ambiguity attacks
Proceedings of the 3rd ACM workshop on Digital rights management
Constructing a virtual primary key for fingerprinting relational data
Proceedings of the 3rd ACM workshop on Digital rights management
A general framework for robust watermarking security
Signal Processing - Special section: Security of data hiding technologies
Watermarking relational data: framework, algorithms and analysis
The VLDB Journal — The International Journal on Very Large Data Bases
Invertibility attack against watermarking based on forged algorithm and a countermeasure
Pattern Recognition Letters
Overcoming the obstacles of zero-knowledge watermark detection
Proceedings of the 2004 workshop on Multimedia and security
Fingerprinting Relational Databases: Schemes and Specialties
IEEE Transactions on Dependable and Secure Computing
Robust non-interactive zero-knowledge watermarking scheme against cheating prover
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
Watermarking and ownership problem: a revisit
Proceedings of the 5th ACM workshop on Digital rights management
Zero-knowledge watermark detection resistant to ambiguity attacks
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Security issues in watermarking applications - a deeper look
Proceedings of the 4th ACM international workshop on Contents protection and security
Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization
Fundamenta Informaticae
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
An additive-attack-proof watermarking mechanism for databases' copyrights protection using image
Proceedings of the 2007 ACM symposium on Applied computing
The first 50 years of electronic watermarking
EURASIP Journal on Applied Signal Processing
Dynamic graph-based software fingerprinting
ACM Transactions on Programming Languages and Systems (TOPLAS)
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
A secure watermarking scheme for buyer-seller identification and copyright protection
EURASIP Journal on Applied Signal Processing
A new approach to countering ambiguity attacks
Proceedings of the 9th workshop on Multimedia & security
A new repeating color watermarking scheme based on human visual model
EURASIP Journal on Applied Signal Processing
Attacks on a robust watermarking scheme based on self-reference image
Computer Standards & Interfaces
HDWT-based grayscale watermark for copyright protection
Expert Systems with Applications: An International Journal
Tampering with a watermarking-based image authentication scheme
Pattern Recognition
Proceedings of the 10th ACM workshop on Multimedia and security
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Attack on a semi-blind watermarking scheme based on singular value decomposition
Computer Standards & Interfaces
A light weight buyer-seller watermarking protocol
Advances in Multimedia
Copyright protection protocols for copyright protection issues
WSEAS Transactions on Computer Research
The use of digital watermarking for intelligence multimedia document distribution
Journal of Theoretical and Applied Electronic Commerce Research
Hardware assisted watermarking for multimedia
Computers and Electrical Engineering
Video Watermarking and Benchmarking
Proceedings of the 2007 conference on Emerging Artificial Intelligence Applications in Computer Engineering: Real Word AI Systems with Applications in eHealth, HCI, Information Retrieval and Pervasive Technologies
An efficient buyer-seller watermarking protocol based on composite signal representation
Proceedings of the 11th ACM workshop on Multimedia and security
A secure digital camera architecture for integrated real-time digital rights management
Journal of Systems Architecture: the EUROMICRO Journal
IEEE Transactions on Image Processing
Proceedings of the 9th Symposium on Identity and Trust on the Internet
Designated verification of digital watermark for network based image distribution
ICCS'03 Proceedings of the 2003 international conference on Computational science
From weak to strong watermarking
TCC'07 Proceedings of the 4th conference on Theory of cryptography
A fractal watermark solution for product data
CSCWD'06 Proceedings of the 10th international conference on Computer supported cooperative work in design III
Optimization approach for 3D model watermarking by linear binary programming
Computer Aided Geometric Design
Security models of digital watermarking
MCAM'07 Proceedings of the 2007 international conference on Multimedia content analysis and mining
Non-invertible DWT domain image watermarking using human visual model
ICICS'09 Proceedings of the 7th international conference on Information, communications and signal processing
Network-based traitor-tracing technique using traffic pattern
IEEE Transactions on Information Forensics and Security
An ASIC implementation of a low power robust invisible watermarking processor
Journal of Systems Architecture: the EUROMICRO Journal
Digital watermarking for multimedia protection
ICAI'05/MCBC'05/AMTA'05/MCBE'05 Proceedings of the 6th WSEAS international conference on Automation & information, and 6th WSEAS international conference on mathematics and computers in biology and chemistry, and 6th WSEAS international conference on acoustics and music: theory and applications, and 6th WSEAS international conference on Mathematics and computers in business and economics
An ID-based digital watermarking protocol for copyright protection
Computers and Electrical Engineering
A blind reversible method for watermarking relational databases based on a time-stamping protocol
Expert Systems with Applications: An International Journal
Enhanced watermarking scheme based on texture analysis
ACIVS'06 Proceedings of the 8th international conference on Advanced Concepts For Intelligent Vision Systems
A survey of watermarking security
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
On the possibility of non-invertible watermarking schemes
IH'04 Proceedings of the 6th international conference on Information Hiding
A digital watermarking scheme for personal image authentication using eigenface
PCM'04 Proceedings of the 5th Pacific Rim conference on Advances in Multimedia Information Processing - Volume Part III
Watermarking protocol compatible with secret algorithms for resisting invertibility attack
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
A generalized method for constructing and proving zero-knowledge watermark proof systems
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Towards the public but noninvertible watermarking
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Arbitrated verifier signature with message recovery for proof of ownership
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I
An efficient dispute resolving method for digital images
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Watermarking spatial trajectory database
DASFAA'05 Proceedings of the 10th international conference on Database Systems for Advanced Applications
Ambiguity attacks on the ganic-eskicioglu robust DWT-SVD image watermarking scheme
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Improving watermark resistance against removal attacks using orthogonal wavelet adaptation
SOFSEM'12 Proceedings of the 38th international conference on Current Trends in Theory and Practice of Computer Science
Embedding Invisible Watermarks into Digital Images Based on Side-Match Vector Quantization
Fundamenta Informaticae
An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking
Proceedings of the first ACM workshop on Information hiding and multimedia security
Consideration of the watermark inversion attack and its invalidation framework
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
An efficient fragile web pages watermarking for integrity protection of XML documents
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Content-Based Web Watermarking
International Journal of Knowledge Society Research
Hi-index | 0.09 |
Digital watermarks have been proposed as a means for copyright protection of multimedia data. We address the capability of invisible watermarking schemes to resolve copyright ownership. We show that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone. Specifically, we attack existing techniques by providing counterfeit watermarking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership. In the absence of standardization and specific requirements imposed on watermarking procedures, anyone can claim ownership of any watermarked image. In order to protect against the counterfeiting techniques that we develop, we examine the properties necessary for resolving ownership via invisible watermarking. We introduce and study invertibility and quasi-invertibility of invisible watermarking techniques. We propose noninvertible watermarking schemes, and subsequently give examples of techniques that we believe to be nonquasi-invertible and hence invulnerable against more sophisticated attacks proposed in the paper. The attacks and results presented in the paper, and the remedies proposed, further imply that we have to carefully reevaluate the current approaches and techniques in invisible watermarking of digital images based on application domains, and rethink the promises, applications and implications of such digital means of copyright protection