1998
DOI: 10.1109/49.668980
|View full text |Cite
|
Sign up to set email alerts
|

Some general methods for tampering with watermarks

Abstract: Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application is for copyright control, where it is envisaged that digital video recorders will not permit the recording of content that is watermarked as "never copy". In such a scenario, it is important that the watermark survive both normal signal transformations and attempts to remove the watermark so that an illegal copy can be made. In this paper, we discuss to what extent a watermark can be resist… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
90
0

Year Published

1999
1999
2016
2016

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 192 publications
(90 citation statements)
references
References 10 publications
0
90
0
Order By: Relevance
“…The issue of watermark removal is often addressed in watermarking literature and remains an important concern [9]. There are a number of other issues, some technical and some non-technical, which have also come to play an important role.…”
Section: Watermark System Design Issuesmentioning
confidence: 99%
See 2 more Smart Citations
“…The issue of watermark removal is often addressed in watermarking literature and remains an important concern [9]. There are a number of other issues, some technical and some non-technical, which have also come to play an important role.…”
Section: Watermark System Design Issuesmentioning
confidence: 99%
“…Second, the watermark detector needs logic to recognize the MPEG data-type. This task may become challenging since there are a number of possible circumvention strategies [9], including PC device drivers that intentionally read-out disk sectors in random order. Increases in DVD drive data rates will place higher demands on such MPEG detection and watermark detection circuitry.…”
Section: ) Watermark Detection In the Drivementioning
confidence: 99%
See 1 more Smart Citation
“…This sequence is different for each content, so the average attack is useless. And finally, the detection algorithm is not linear which makes the attack of [12] non valid. Although this watermarking technique has, for the moment, only one bit of capacity, a copy protection system for digital contents can be based on it.…”
Section: Security Point Of Viewmentioning
confidence: 99%
“…It clearly appears that the embedding and detection processes have a common parameter called the key. Thus, comparing to a cryptography system, current watermarking techniques are symmetric schemes [12]. The key parameter is usually called the secret key in reference to Kerckhoffs cryptographic principle [14]: A cryptographic algorithm can not remain secret, hence the security of a cryptosystem must only rely on the key kept in a safe place.…”
Section: Introductionmentioning
confidence: 99%