1998
DOI: 10.1109/49.668979
|View full text |Cite
|
Sign up to set email alerts
|

Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications

Abstract: Digital watermarks have been proposed in recent literature as a means for copyright protection of multimedia data. In this paper we address the capability of invisible watermarking schemes to resolve copyright ownership. We show that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone. Specifically, we attack existing techniques by providing counterfeit watermarking schemes that can be performed on a watermarked image to allow multiple claims of rightful owners… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
216
0

Year Published

2005
2005
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 412 publications
(216 citation statements)
references
References 13 publications
(50 reference statements)
0
216
0
Order By: Relevance
“…These techniques can also be used to disable or overwrite watermarks. Multiple watermarks can be placed in an image and one cannot determine which one is valid [29].…”
Section: Figure4 a Watermarking Based Authentication Systemmentioning
confidence: 99%
“…These techniques can also be used to disable or overwrite watermarks. Multiple watermarks can be placed in an image and one cannot determine which one is valid [29].…”
Section: Figure4 a Watermarking Based Authentication Systemmentioning
confidence: 99%
“…It allows to firmly bound content with metadata such as the copyright holder identity (copyright protection [2]) or the copy status (copy protection [3]). At that time, the naïve rationale was: "If you can't see it, and if it is not removed by common processing, then it must be secure".…”
Section: As Cryptography Leaves Insecure Protected Contentmentioning
confidence: 99%
“…For example, it may be used to control the number of copies made of a watermarked object [2], resolve the true ownership of a multimedia object [6], or verify that the object has not been changed from its original form [9]. In contrast, VEIL is designed to help the data consumer.…”
Section: Securitymentioning
confidence: 99%