2005
DOI: 10.1007/11551492_16
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Watermarking Security

Abstract: Abstract. Digital watermarking studies have always been driven by the improvement of robustness. Most of articles of this field deal with this criterion, presenting more and more impressive experimental assessments. Some key events in this quest are the use of spread spectrum, the invention of resynchronization schemes, the discovery of side information channel, and the formulation of the opponent actions as a game. On the contrary, security received little attention in the watermarking community. This paper p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2006
2006
2016
2016

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 41 publications
0
12
0
Order By: Relevance
“…With a little extra work, Attack II, on the other hand, allows one to replace an image block with a # Steps 1 Obtain watermarked image 2 Perform Z-transform to find position of roots 3 Apply a scaling factor, β to the complex conjugate roots only 4 Perform inverse Z-transform 5 Authenticate tampered image (Result: Authentication PASSED) chosen pattern without being detected. We conclude by reiterating the importance of security analysis while designing watermarking schemes [4], especially ones such as the Ho et al scheme designed for forensic analysis of biomedical images, where integrity is concerned.…”
Section: Resultsmentioning
confidence: 84%
“…With a little extra work, Attack II, on the other hand, allows one to replace an image block with a # Steps 1 Obtain watermarked image 2 Perform Z-transform to find position of roots 3 Apply a scaling factor, β to the complex conjugate roots only 4 Perform inverse Z-transform 5 Authenticate tampered image (Result: Authentication PASSED) chosen pattern without being detected. We conclude by reiterating the importance of security analysis while designing watermarking schemes [4], especially ones such as the Ho et al scheme designed for forensic analysis of biomedical images, where integrity is concerned.…”
Section: Resultsmentioning
confidence: 84%
“…In such circumstances, it is too strict to conclude whether the operation is malicious or innocent. Thus, the two sets overlaps, but they are never identical as attacks to security includes a broader scope than attacks to robustness and therefore, we can conclude that robustness is not sufficient for security [18]. Secondly, the security of a watermarking system depends largely on the considered application meaning that each application may require its own type of security.…”
Section: Securitymentioning
confidence: 93%
“…In the last few decades, the watermarking security issue has become one of the main challenges facing the design of watermarking techniques and there has been criticism that many proposed watermarking security solutions are weak or not as strong as they claim [18]. Regardless of the data type, we have identified a few challenges for watermark security herein.…”
Section: Securitymentioning
confidence: 97%
See 1 more Smart Citation
“…One possible solution to this problem is the watermarking technique, in which it is added an imperceptible and statistically undetectable signature to multimedia content. Watermarking has been considered as one of the techniques with capacity to solve problems such as unauthorized copying and distribution of digital materials [1].…”
Section: Introductionmentioning
confidence: 99%