On the possibility of non-invertible watermarking schemes
IH'04 Proceedings of the 6th international conference on Information Hiding
A robust protocol for proving ownership of multimedia content
IEEE Transactions on Multimedia
IEEE Journal on Selected Areas in Communications
Visual cryptography based watermarking: definition and meaning
IWDW'12 Proceedings of the 11th international conference on Digital Forensics and Watermaking
Hi-index | 0.00 |
Although it is clear that security is an important issue in digital watermarking applications,the main concerns addressed by the current literature are robustness, capacity and imperceptibility. The inadequacy of the prevailing design paradigm in tackling security issues is mainly due to an incomplete assessment of the threat model. The goal of this paper is to take a detailed and rigorous look at the threat model for a variety of watermarking applications. In this extended abstract, we outline the security requirements for a few common watermarking applications and explore in more detail the threat model for a specific application that involves establishing ownership of multimedia content.