Multimedia authenticity protection with ICA watermarking and digital bacteria vaccination
نویسندگان
چکیده
We propose the application of independent component analysis (ICA), via unsupervised neural networks, to authenticity protection for multimedia products. We give an overview of the current state of multimedia authenticity protection, including the requirements of various multimedia applications, current approaches to the problem, and the robustness of the approaches. For watermark security, a covert independent-component watermarking signal can serve as a 'vaccination' against a dormant digital 'bacteria' protecting the multimedia data. An unauthorized removal of the watermark triggers the bacteria payload, which then degrades the quality of the unauthorized data. We argue that such digital bacteria meet all the established requirements for beneficial virus-like programs, and their payload would merely affect pirated media. We show how these new approaches contribute to a flexible, robust, and secure system for protecting the authenticity of multimedia products.
منابع مشابه
Protecting Multimedia Authenticity With ICA Vaccination of Digital Bacteria Watermarks
We propose the application of independent component analysis (ICA), via unsupervised neural networks, to authenticity protection for multimedia products. We give an overview of the current state of multimedia authenticity protection, including the requirements of various multimedia applications, current approaches to the problem, and the robustness of the approaches. For watermark security, a c...
متن کاملDigital Watermarking Technology in Different Domains
Due to high speed computer networks, the use of digitally formatted data has increased many folds.The digital data can be duplicated and edited with great ease which has led to a need for effectivecopyright protection tools. Digital Watermarking is a technology of embedding watermark withintellectual property rights into images, videos, audios and other multimedia data by a certainalgorithm .Di...
متن کاملDigital Image Watermarking: A Survey
Recently, works are completely based on the internet, so authentication is required to protect the content of the data because owner never wants to degrade the quality of his data. Information hiding via digital watermarks for the multimedia data is the compatible way to provide the protection of data. Watermarks are imperceptible and it is predefined pattern inserting into multimedia data to p...
متن کاملTamper-resistant storage techniques for multimedia systems
Tamper-resistant storage techniques provide varying degrees of authenticity and integrity for data. This paper surveys five implemented tamper-resistant storage systems that use encryption, cryptographic hashes, digital signatures and error-correction primitives to provide varying levels of data protection. Five key evaluation points for such systems are: (1) authenticity guarantees, (2) integr...
متن کاملIca Based Digital Image Watermarking Based on Redundant Discrete Wavelet Transform
In recent years, access to multimedia data has become much easier due to rapid growth of the internet. While this is usually considered an improvement of everyday life, it also makes unauthorized copying and distributing of multimedia data much easier, therefore presenting a field of watermarking. Many literatures have reported about Discrete Wavelet Transform watermarking techniques for data s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Neural networks : the official journal of the International Neural Network Society
دوره 16 5-6 شماره
صفحات -
تاریخ انتشار 2003