ABSTRACT
We analyze the fingerprinting method in [1] and suggest attacks that are better than the ones presented therein. To do this, we observe and use some extra information available in the system. Selection of different attack channel distortion constraints are also discussed. See [2] for various recently proposed attacks on spread spectrum fingerprinting systems for private watermarking.
- D. Kirovski, H.S. Malvar, and Y. Yacobi, "Multimedia Content Screening using a Dual Watermarking and Fingerprinting System", ACM Multimedia, 2002. Google ScholarDigital Library
- H. Zhao,M. Wu, Z.J. Wang,and K.J.R. Liu "Nonlinear Collusion Attacks on Independent Fingerprings for Multimedia", Proc. of IEEE Int. Conf. on Acoustics, Speech, and Signal Processing (ICASSP'03), Hong Kong, April 2003. Google ScholarDigital Library
Index Terms
- An improved attack analysis on a public-key spread spectrum watermarking
Recommendations
An improved attack analysis on a public-key spread spectrum watermarking
We analyze the fingerprinting method in Kirovski et al. (2002) and suggest attacks that are better than the ones presented therein. To do this, we observe and use some extra information available in the system. We derive the optimal subtractive ...
Digital image watermarking by spread spectrum
ICCOM'07: Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11One digital watermarking method, based on the spread spectrum technique, is described in this paper. This method uses the frequency hopping spread spectrum in order to determine positions for watermark embedding in an original image, while the direct ...
Spread Spectrum Watermarking: Zero Rate Embedding to High Payload System
MINES '09: Proceedings of the 2009 International Conference on Multimedia Information Networking and Security - Volume 01This article presents a brief review on non-blind and blind spread spectrum (SS) watermarking developed for multimedia signals. The discussion gradually moves from zero-rate embedding to high payload and variable embedding systems that take into ...
Comments