Katzenbeisser et al., 2002 - Google Patents
Securing symmetric watermarking schemes against protocol attacksKatzenbeisser et al., 2002
- Document ID
- 11292426943703248892
- Author
- Katzenbeisser S
- Veith H
- Publication year
- Publication venue
- Security and Watermarking of Multimedia Contents IV
External Links
Snippet
With the advent of the web and the creation of electronic distribution channels for multimedia objects, there is an increased risk of copyright infringements. Content providers try to alleviate this problem by using copyright protection facilities that often involve watermarking …
- 238000000034 method 0 abstract description 26
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/005—Robust watermarking, e.g. average attack or collusion attack resistant
- G06T1/0071—Robust watermarking, e.g. average attack or collusion attack resistant using multiple or alternating watermarks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0202—Image watermarking whereby the quality of watermarked images is measured; Measuring quality or performance of watermarking methods; Balancing between quality and robustness
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0063—Image watermarking in relation to collusion attacks, e.g. collusion attack resistant
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0051—Embedding of the watermark in the spatial domain
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/3232—Robust embedding or watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32154—Transform domain methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0061—Embedding of the watermark in each block of the image, e.g. segmented watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0052—Embedding of the watermark in the frequency domain
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Rey et al. | A survey of watermarking algorithms for image authentication | |
| Craver et al. | Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications | |
| Craver et al. | Can invisible watermarks resolve rightful ownerships? | |
| Voyatzis et al. | The use of watermarks in the protection of digital multimedia products | |
| Li | Digital fragile watermarking scheme for authentication of JPEG images | |
| US6101602A (en) | Digital watermarking by adding random, smooth patterns | |
| Lin et al. | Temporal synchronization in video watermarking | |
| US20030070075A1 (en) | Secure hybrid robust watermarking resistant against tampering and copy-attack | |
| Qiao et al. | Watermarking methods for MPEG encoded video: Towards resolving rightful ownership | |
| Liu et al. | A review study on digital watermarking | |
| Adelsbach et al. | Watermarking schemes provably secure against copy and ambiguity attacks | |
| Katzenbeisser et al. | Securing symmetric watermarking schemes against protocol attacks | |
| Craver et al. | Copyright protection protocols based on asymmetric watermarking: The ticket concept | |
| Koliwad | A comprehensive survey of contemporary researches in watermarking for copyright protection of digital images | |
| Craver et al. | Security analysis of public key watermarking schemes | |
| CN102270336A (en) | Safe fragile watermarking method based on multiple dependency structures | |
| Zhou et al. | Security theory and attack analysis for text watermarking | |
| CN114782238A (en) | Image self-authentication method based on hash function and information hiding | |
| Adelsbach et al. | On the insecurity of non-invertible watermarking schemes for dispute resolving | |
| Das et al. | Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme | |
| He et al. | Block-chain based fragile watermarking scheme with superior localization | |
| Katzenbeisser | On the integration of watermarks and cryptography | |
| Lin | Digital watermarking models for resolving rightful ownership and authenticating legitimate customer | |
| Li et al. | Security issues in watermarking applications-A deeper look | |
| Marvel | Information hiding: Steganography and watermarking |