Sciweavers

KES
2005
Springer

Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack

14 years 6 months ago
Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack
Abstract. Invertibility attack is a hostile measure to breach watermarking systems. In this paper, a novel watermarking protocol using a one-way hash function and a check of random watermarks is proposed in order to combat invertibility attacks. The described technique can be used in conjunction with any watermarking algorithm, no matter it is kept secret or made public, without resorting to a third party jury as required by some previous approaches. By introducing a set of reference sequences, segmentation of the digital information and iterative computation of watermarks, the protocol is further enhanced so that it can resist more sophisticated types of attack based on forging an illegitimate detector.
Xinpeng Zhang, Shuozhong Wang
Added 28 Jun 2010
Updated 28 Jun 2010
Type Conference
Year 2005
Where KES
Authors Xinpeng Zhang, Shuozhong Wang
Comments (0)