2003 IEEE International Conference on Acoustics, Speech, and Signal Processing, 2003. Proceedings. (ICASSP '03).
DOI: 10.1109/icassp.2003.1199109
|View full text |Cite
|
Sign up to set email alerts
|

Using digital watermarks with image signatures to mitigate the threat of the copy attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
12
0

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…In [9] J. Barr et.al., developed a system which will mitigate the threat posed by the copy attack. They first developed an image signature algorithm which uses highly stable low frequency DCT coefficients to uniquely describe the image.…”
Section: Literature Surveymentioning
confidence: 99%
“…In [9] J. Barr et.al., developed a system which will mitigate the threat posed by the copy attack. They first developed an image signature algorithm which uses highly stable low frequency DCT coefficients to uniquely describe the image.…”
Section: Literature Surveymentioning
confidence: 99%
“…Finally, feature vectors are extracted from these blocks. In this paper, we adopt the DCT-sign-based feature [9] as depicted in Figure 1; each block is resized into 8x8 pixels, and 2D-DCT is performed. Top-v AC coefficients in the zigzag scan order are used as a feature vector.…”
Section: Feature Extraction and Multiple Assignmentmentioning
confidence: 99%
“…However, there indeed exist attacks that can defeat a watermarking system without sacrificing media quality. Among the currently known attacks [43], the collusion attack [15], [35], [37], which is a removal attack, and the copy attack [3], [17], which is a protocol attack, are typical examples of attacks that can achieve the aforementioned goal. The common step used to realize a collusion or copy attack is watermark estimation, which is usually accomplished by means of a denoising procedure.…”
mentioning
confidence: 99%
“…The related works [3], [8], [15], [37] proposed to resist either the collusion attack or the copy attack are briefly discussed as follows. In [3], Barr et al proposed to concatenate a watermark message and a block signature as an embedded signal to combat the copy attack. Their block signature is generated by first choosing the 16 16 DCT coefficients in the lowest frequency subbands (the DC term is zeroed out) from a 128 128 DCT transformed image block.…”
mentioning
confidence: 99%
See 1 more Smart Citation