Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications

被引:275
作者
Craver, S [1 ]
Memon, N
Yeo, BL
Yeung, MM
机构
[1] No Illinois Univ, Dept Math, De Kalb, IL 60115 USA
[2] Hewlett Packard Labs, Imaging Technol Dept, Palo Alto, CA 94304 USA
[3] IBM Corp, Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
关键词
attacks on digital watermarks; copyright protection; counterfeit watermarks; cryptography; invertible and noninvertible watermarking; invisible watermarks; quasi-invertible watermarking;
D O I
10.1109/49.668979
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Digital watermarks have been proposed in recent literature as a means for copyright protection of multimedia data, In this paper we address the capability of invisible watermarking schemes to resolve copyright ownership. We show that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone. Specifically, we attack existing techniques by providing counterfeit watermarking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership. In the absence of standardization and specific requirements imposed on watermarking procedures, anyone can claim ownership of any watermarked image. In order to protect against the counterfeiting techniques that we develop, we examine the properties necessary for resolving ownership via invisible watermarking, We introduce and study invertibility and quasi-invertibility of invisible watermarking techniques, We propose noninvertible watermarking schemes, and subsequently give examples of techniques that we believe to be nonquasi-invertible and hence invulnerable against more sophisticated attacks proposed in the paper. The attacks and results presented in the paper, and the remedies proposed, further imply that we have to carefully reevaluate the current approaches and techniques in invisible watermarking of digital images based on application domains, and rethink the promises, applications and implications of such digital means of copyright protection.
引用
收藏
页码:573 / 586
页数:14
相关论文
共 20 条
  • [1] [Anonymous], P IEEE INT C IM PROC
  • [2] Bender W., 1995, Proceedings of the SPIE - The International Society for Optical Engineering, V2420, P164, DOI 10.1117/12.205315
  • [3] BOLAND FM, 1995, P IEE INT C IM PROC, P326
  • [4] COX IJ, 1996, IEEE P INT C IM PROC, V3, P243
  • [5] COX IJ, 1997, P SPIE HUMAN VISIO 2, V3016
  • [6] Can invisible watermarks resolve rightful ownerships?
    Craver, S
    Memon, N
    Yeo, BL
    Yeung, M
    [J]. STORAGE AND RETRIEVAL FOR IMAGE AND VIDEO DATABASES V, 1997, 3022 : 310 - 321
  • [7] *IBM, 1996, 20509 IBM RC
  • [8] LANGOLAAR G, 1996, COPY PROTECTION MULT
  • [9] *NAT I STAND TECHN, 1995, NIST FIPS PUB, V1801
  • [10] NIKOLAIDIS N, 1996, P INT C ACOUSTICS SP, V4, P2168