Some general methods for tampering with watermarks

被引:139
作者
Cox, IJ
Linnartz, JPMG
机构
[1] NEC Res Inst, Princeton, NJ 08540 USA
[2] Philips Res Labs, Natuurkundig Lab, NL-5656 AA Eindhoven, Netherlands
关键词
D O I
10.1109/49.668980
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application is for copyright control, where it is envisaged that digital video recorders will not permit the recording of content that is watermarked as "never copy." In such a scenario, it is important that the watermark survive both normal signal transformations and attempts to remove the watermark so that an illegal copy can be made. In this paper, we discuss to what extent a watermark can be resistant to tampering and describe a variety of possible attacks.
引用
收藏
页码:587 / 593
页数:7
相关论文
共 13 条
[1]  
BENDER W, 1995, P SPIE, V420
[2]  
BOLAND FM, 1995, P IEE INT C IM PROC, P326
[3]  
Cox I., 1996, P WORKSH INF HID U C, P175
[4]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[5]   A review of watermarking and the importance of perceptual modeling [J].
Cox, IJ ;
Miller, ML .
HUMAN VISION AND ELECTRONIC IMAGING II, 1997, 3016 :92-99
[6]  
COX IJ, 1997, P IEEE ITN C IM PROC
[7]  
FRANZ E, 1996, LECT NOTES COMPUTER, V1174, P7
[8]  
KOCH E, 1995, P IEEE WORKSH NONL S
[9]  
LINNARTZ JP, 1997, P IEEE 5 S COMM VEH, P202
[10]  
PITAS I., 1995, P IEEE WORKSH NONL S