Digital image processing
Robust audio watermarking using perceptual masking
Signal Processing
Handbook of Applied Cryptography
Handbook of Applied Cryptography
On the invertibility of invisible watermarking techniques
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
Watermarking Methods for MPEG Encoded Video: Towards Resolving Rightful Ownership
ICMCS '98 Proceedings of the IEEE International Conference on Multimedia Computing and Systems
IEEE Journal on Selected Areas in Communications
Some general methods for tampering with watermarks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
To overcome the reversibility of the widely researched adaptive watermarking, the existing method based on cryptography is first directly revised for adaptive systems. The intrinsic irreversibility of some adaptive technologies is then disclosed and evaluated. Under these technologies, attackers have great difficulty dividing a released version into their claimed original data and scaled watermarks, and in the meantime making the latter be the particular adaptive results based on the former. Their reversed solutions are violently perturbed and perceptually unacceptable. The condition number of the coefficient matrix of the reverse equations can be employed to assess the degree of the perturbation. The proposed method is more efficient because it disposes of any cryptographic processing, such as hashing and stream generation. The experiments on images support the theoretic conclusion well.