On the Invertibility of Invisible Watermarking Techniques
نویسندگان
چکیده
In this paper we address the invertibility of invisible watermarking schemes for resolving rightful ownerships, and present attacks which can cause confusion to rightful claims. We shall show that non-invertibility is a necessary but not sufficient condition in resolving ownership disputes. We then define quasi-invertible watermarking schemes, and, present analysis that links invertibility and quasi-invertibility to some classes of watermarking techniques with different properties (which may or may not require original versions in watermark decoding), as well as to the different classes of attacks we have developed.
منابع مشابه
Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications
Digital watermarks have been proposed in recent literature as a means for copyright protection of multimedia data. In this paper we address the capability of invisible watermarking schemes to resolve copyright ownership. We show that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone. Specifically, we attack existing techniques by providing cou...
متن کاملVLSI architecture and chip for combined invisible robust and fragile watermarking
Research in digital watermarking is mature. Several software implementations of watermarking algorithms are described in the literature, but few attempts have been made to describe hardware implementations. The ultimate objective of the research presented in this paper was to develop low-power, highperformance, real-time, reliable and secure watermarking systems, which can be achieved through h...
متن کاملWatermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack
Invertibility attack is a hostile measure to breach watermarking systems. In this paper, a novel watermarking protocol using a one-way hash function and a check of random watermarks is proposed in order to combat invertibility attacks. The described technique can be used in conjunction with any watermarking algorithm, no matter it is kept secret or made public, without resorting to a third part...
متن کاملZero-knowledge Software Watermarking for C Programs
This paper proposes a novel method for watermarking C source code by exploiting the programming language features.The key idea of our watermarking scheme is a semantics-preserving program transformation, based on a hidden permutation of local identifiers, followed by another hidden permutation of the functions defined in the source code. This last permutation allows to encrypt the prove of owne...
متن کاملWatermarking Methods for MPEG Encoded Video: Towards Resolving Rightful Ownership
Various digital watermarking techniques have been proposed in recent years as the methods to protect the copyright of multimedia data. However, as pointed out by the IBM research group, the rightful ownership problem has not been properly solved. Currently, there are two proposals to solve the ownership problem. Unfortunately, one proposal lacks a formal proof and the other can be easily defeat...
متن کامل