Technical trials and legal tribulations
Communications of the ACM
A functional taxonomy for software watermarking
ACSC '02 Proceedings of the twenty-fifth Australasian conference on Computer science - Volume 4
WAIM '02 Proceedings of the Third International Conference on Advances in Web-Age Information Management
Asymptotic Analyses of Visual Distortions: A New Approach to Defining Transparency
PCM '02 Proceedings of the Third IEEE Pacific Rim Conference on Multimedia: Advances in Multimedia Information Processing
Protection of wavelet-based watermarking systems using filter parametrization
Signal Processing - Special section: Security of data hiding technologies
Invertibility attack against watermarking based on forged algorithm and a countermeasure
Pattern Recognition Letters
Query-based watermarking for XML data
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A survey of watermarking security
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Towards the public but noninvertible watermarking
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
Watermarking essential data structures for copyright protection
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Hi-index | 0.02 |
We shall show that non-invertibility is a necessary but not sufficient condition in resolving ownership disputes. We then define quasi-invertible watermarking schemes, and, present analysis that links invertibility and quasi-invertibility to some classes of watermarking techniques with different properties (which may or may not require original versions in watermark decoding), as well as to the different classes of attacks we have developed.