2007
DOI: 10.1109/tcsvt.2006.888837
|View full text |Cite
|
Sign up to set email alerts
|

Near-Optimal Watermark Estimation and Its Countermeasure: Antidisclosure Watermark for Multiple Watermark Embedding

Abstract: Abstract-Robustness is a critical requirement for a watermarking scheme to be practical. Current watermarking methods usually claim a certain degree of robustness against those attacks that aim to destroy a hidden watermark at the expense of degrading the quality of the media data. However, there exist watermarkestimation attack (WEA), such as the collusion attack, which can remove watermarks while making the attacked data further transparent to its original. Another kind of attack is the copy attack, which ca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 41 publications
0
9
0
Order By: Relevance
“…By considering the above goals, some form of multiple watermarking techniques [21,22,29,30,39,42,49,50] and neural networks based watermarking techniques [7, 8, 13, 14, 20, 31, 34, 45-48, 51, 52] have been proposed in the past. A short tour on the existing multiple watermarking techniques is given below:…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…By considering the above goals, some form of multiple watermarking techniques [21,22,29,30,39,42,49,50] and neural networks based watermarking techniques [7, 8, 13, 14, 20, 31, 34, 45-48, 51, 52] have been proposed in the past. A short tour on the existing multiple watermarking techniques is given below:…”
Section: Related Workmentioning
confidence: 99%
“…The authors failed to discuss about other issues such as robustness, visual quality. Multiple watermarking introduced in [29] by Lu and Hsu, was able to withstand the attacks, such as, collusion attack and copy attack, by embedding multiple redundant watermarking on cover media. In [39], the authors Takahasti et al have utilized three different types of information as watermarks, that is, copyright management information, copy control information and fingerprints.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The quantization visual model requires embedding the watermarks in the weighting mean of wavelet blocks, and watermark detection is done via statistical detection. In addition, a content-dependent watermarking is proposed by Lu and Hsu (2007) to tackle the watermark estimation attack (WEA). This article adds insight into WEA, defining optimal-watermark estimation, and showing experiments to prove that the scheme is near perfect for watermark estimation.…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, repeating the same watermark opens the door for collusion attacks [9]. That is, an attacker may be able to use the repetition to find the embedded watermark and remove it.…”
Section: Introductionmentioning
confidence: 99%