2002
DOI: 10.1117/12.465281
|View full text |Cite
|
Sign up to set email alerts
|

<title>Watermarking protocols for authentication and ownership protection based on timestamps and holograms</title>

Abstract: Digital watermarking has become an accepted technology for enabling multimedia protection schemes. One problem here is the security of these schemes. Without a suitable framework, watermarks can be replaced and manipulated. We discuss different protocols providing security against rightful ownership attacks and other fraud attempts. We compare the characteristics of existing protocols like direct embedding or seed based protocols for different media and the required attributes of the watermarking technology, l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2003
2003
2008
2008

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(19 citation statements)
references
References 5 publications
(5 reference statements)
0
19
0
Order By: Relevance
“…Potential reversibility problems associated with the limited range of values in the digital representation of the host image, e.g., overflow and underflow during addition and subtraction, are prevented by adopting modulo arithmetic [16] or a circular interpretation of the bijective transform [13]. In Type-II algorithms [14,17], information bits are embedded by modifying the selected features of the host image, for instance least significant bits or high frequency coefficients. The reversibility for the original host image is achieved by compressing the original features and transmitting the compressed bit stream as a part of the embedded payload.…”
Section: Existing Methodologymentioning
confidence: 99%
“…Potential reversibility problems associated with the limited range of values in the digital representation of the host image, e.g., overflow and underflow during addition and subtraction, are prevented by adopting modulo arithmetic [16] or a circular interpretation of the bijective transform [13]. In Type-II algorithms [14,17], information bits are embedded by modifying the selected features of the host image, for instance least significant bits or high frequency coefficients. The reversibility for the original host image is achieved by compressing the original features and transmitting the compressed bit stream as a part of the embedded payload.…”
Section: Existing Methodologymentioning
confidence: 99%
“…Earlier methods either require the reconstruction of the original 7, 9 or require verification of multiple watermarks (digital signatures). 13 In the latter case, the use of a single authentication watermark also saves valuable reversible data embedding capacity. At the embedder, performing the reversible data embedding step before authentication watermarking offers similar computational advantages.…”
Section: Novel Lossless Authentication Frameworkmentioning
confidence: 99%
“…Dittmann et al 13 proposed an alternative protocol for the LSB compression technique. 7 They replace the signature of the whole image with two signatures that are computed from the most significant bits (MSB) of the image and the compressed version of the LSBs, respectively.…”
Section: Novel Lossless Authentication Frameworkmentioning
confidence: 99%
“…Other implementations can be found in (Fridrich et al, 2001;Fridrich et al, 2002a;Dittmann et al, 2002).…”
Section: Invertible Watermarksmentioning
confidence: 99%