On the invertibility of invisible watermarking techniques
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
A watermarking technique based on one-way hash functions
IEEE Transactions on Consumer Electronics
Attacks on digital watermarks: classification, estimation based attacks, and benchmarks
IEEE Communications Magazine
Multiresolution scene-based video watermarking using perceptual models
IEEE Journal on Selected Areas in Communications
IEEE Journal on Selected Areas in Communications
Watermarking protocol compatible with secret algorithms for resisting invertibility attack
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Hi-index | 0.10 |
It is shown in this paper that, even with a non-invertible watermarking algorithm or an asymmetric watermarking protocol, it is still possible to effect an invertibility attack, which relies on a forged watermarking algorithm, a counterfeit mark, and a fake key. Two examples are given to show the vulnerability of the unfortified non-invertible algorithm/ asymmetric protocol. As a solution, a secure watermarking protocol is proposed, which establishes correlation between the watermarking algorithm and the embedded mark.