Reversibility, Deceptions, and Counteractions in Adaptive Digital Watermarking
DOI:
Author:
Affiliation:

Clc Number:

Fund Project:

  • Article
  • |
  • Figures
  • |
  • Metrics
  • |
  • Reference
  • |
  • Related
  • |
  • Cited by
  • |
  • Materials
  • |
  • Comments
    Abstract:

    To further enhance the security of the present digital watermarking, the reversibility of widely researched adaptive watermarking is investigated. First, watermarking schemes are classified and generalized. Then, on the assumption that adaptive watermarking places no constraint on the formation of watermarks and scaling factors, the reversibility and quasi-reversibility, together with their resulting reverse and quasi-reverse engineering attacks, which could disturb or even overturn the ownership verification, are defined, analyzed and illustrated. Finally, the necessity of placing constraints on the formation of watermarks and scaling factors is concluded, and the essential irreversibility of some adaptive technologies, which can be used to enhance the security, is pointed out. Making watermarks and scaling factors one-way dependent on original data, and exploiting the human perceptual system, help watermarking become resistant to the above attacks and more reliable in ownership verification.

    Reference
    Related
    Cited by
Get Citation

赵险峰,汪为农,陈克非.自适应数字水印中的可反向性以及相关的欺骗和对策.软件学报,2002,13(9):1787-1795

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:October 17,2001
  • Revised:January 08,2002
  • Adopted:
  • Online:
  • Published:
You are the firstVisitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063