2002
DOI: 10.1117/12.465306
|View full text |Cite
|
Sign up to set email alerts
|

<title>Synchronization-insensitive video watermarking using structured noise pattern</title>

Abstract: For most watermarking methods, preserving the synchronization between the watermark embedded in a digital data (image, audio or video) and the watermark detector is critical to the success of the watermark detection process. Many digital watermarking attacks exploit this fact by disturbing the synchronization of the watermark and the watermark detector, and thus disabling proper watermark detection without having to actually remove the watermark from the data. Some techniques have been proposed in the literatu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2002
2002
2009
2009

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…Other embedding methods include multiplicative embedding [91] and quantization embedding [92], [93]. The watermark may be inserted directly in the spatial domain (i.e., the pixels of the video) [94]- [96] or after the video has been transformed. Common transformations include the discrete Fourier transform (DFT) [97], [98], discrete cosine transform (DCT) [90], [99]- [102], and wavelet transforms (WT) [90], [98], [103], [104].…”
Section: B Watermarkingmentioning
confidence: 99%
See 1 more Smart Citation
“…Other embedding methods include multiplicative embedding [91] and quantization embedding [92], [93]. The watermark may be inserted directly in the spatial domain (i.e., the pixels of the video) [94]- [96] or after the video has been transformed. Common transformations include the discrete Fourier transform (DFT) [97], [98], discrete cosine transform (DCT) [90], [99]- [102], and wavelet transforms (WT) [90], [98], [103], [104].…”
Section: B Watermarkingmentioning
confidence: 99%
“…3) Despite the considerable effort that has been spent on developing robust watermarks for digital video, the robustness and security of current watermarking techniques may not be sufficient for some DRM applications. Removal attacks [10], [131], [132] and spatial and temporal synchronization attacks [94]- [97], [99], [133]- [140] remain challenging for watermark detection. Current methods for devising anti-collusion watermarks [141]- [144] for content tracking are vulnerable to collusion attacks from a party consisting of a relatively low number of conspirators.…”
Section: ) Selective Encryption Techniques Have Drawbacks Thatmentioning
confidence: 99%
“…However, it may be difficult to find a transformation with invariance under some forms of attack, such as nonuniform scaling and spatial and temporal cropping. A similar approach is to design the watermark to be less sensitive to synchronization [30].…”
Section: Introductionmentioning
confidence: 99%
“…al (2) . For still images, one branch of countermeasure research attempts to develop better image-watermarking techniques that are robust against different types of geometrical transforms (3,4) . A complementary branch of countermeasures focuses on inverting the geometrical transform prior to watermark detection, to avoid confusion of the watermark detector.…”
Section: Introductionmentioning
confidence: 99%