Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)
DOI: 10.1109/isit.1998.708876
|View full text |Cite
|
Sign up to set email alerts
|

Resistance of digital watermarks to collusive attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

5
97
0

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 61 publications
(102 citation statements)
references
References 8 publications
5
97
0
Order By: Relevance
“…The Gaussian assumption is motivated by the Central Limit Theorem (CLT): A user accusation consists of a sum of per-segment contributions, which are independent and identically distributed 1 The proportionality m ∝ c 2 0 was already known in the context of spread-spectrum watermarking. Kilian et al [9] showed that, if the watermarks have a component-wise normal distribution, then Ω( p m/ln n) differently marked copies are required to successfully erase any mark with non-negligible probability.…”
Section: Exact Computation Of the False Positive Error Probabilitymentioning
confidence: 99%
“…The Gaussian assumption is motivated by the Central Limit Theorem (CLT): A user accusation consists of a sum of per-segment contributions, which are independent and identically distributed 1 The proportionality m ∝ c 2 0 was already known in the context of spread-spectrum watermarking. Kilian et al [9] showed that, if the watermarks have a component-wise normal distribution, then Ω( p m/ln n) differently marked copies are required to successfully erase any mark with non-negligible probability.…”
Section: Exact Computation Of the False Positive Error Probabilitymentioning
confidence: 99%
“…Schemes based on perceptual modeling that attempt to insert maximumpower watermarks are much harder to attack, but small amounts of scaling and cropping will erase many kinds of watermarks. For example, Kilian, et al [17] observed that the CKLS mark can be rendered unreadable by cropping a few rows and columns of pixels and scaling the image to the original size. Such an attack can be countered by aligning (or registering) to the original image; or, if the original is not available, by aligning to a previously inserted registration mark, or by using a watermark that is robust to such transformations, as discussed in Section 5.…”
Section: Robustnessmentioning
confidence: 99%
“…Kilian, et al [17] have observed that correlative-reader watermarks that use a componentwise {-1, 1} or {0, 1} distribution (common in the literature) or even a component-wise uniform distribution are at risk of attack with as few as five or six differently-marked copies. Resistance to collusive attack is the main focus of the theoretical work we discuss in the next section.…”
Section: Robustnessmentioning
confidence: 99%
See 1 more Smart Citation
“…Our problem is different, however, from the collusion-secure fingerprint problem [2,9,12] in the way the watermarked sequences (queries) are generated. In the collusion-attack setting, each user is assigned a unique fingerprint, and an object watermarked with the unique fingerprint is distributed to each user.…”
Section: Introductionmentioning
confidence: 99%