16 Hits in 4.0 sec

An overview of attacks against digital watermarking and their respective countermeasures

Maryam Tanha, Seyed Dawood Sajjadi Torshizi, Mohd Taufik Abdullah, Fazirulhisyam Hashim
2012 Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)  
In addition, it procures a foundation for the evaluation of various watermarking algorithms.  ...  Thus opening avenues for malicious attackers to abuse these security breaches.  ...  collusion-resistant fingerprinting systems and MC-CDMA-based fingerprinting scheme in particular.  In [21] , for defending against fading-like collusion attack, a spread spectrum image watermarking scheme  ... 
doi:10.1109/cybersec.2012.6246095 dblp:conf/cybersec/TanhaTAH12 fatcat:nxlwgrw43fhrlgwuquzr3fhzju

Fingerprinting and forensic analysis of multimedia

Daniel Schonberg, Darko Kirovski
2004 Proceedings of the 12th annual ACM international conference on Multimedia - MULTIMEDIA '04  
In this paper, we explore multimedia fingerprinting as an answer to "the analog hole" problem.  ...  We analyze the collusion resistance of a large class of spreadspectrum fingerprinting systems using a new, gradient attack.  ...  Kivanç Mihçak for numerous suggestions about topics related to this paper. CONCLUSION  ... 
doi:10.1145/1027527.1027712 dblp:conf/mm/SchonbergK04 fatcat:wbh2tclw5fhadntbbmofrwzn6m

Streaming video and rate-scalable compression: What are the challenges for watermarking?

Eugene T. Lin, Christine I. Podilchuk, Ton Kalker, Edward J. Delp III, Ping W. Wong, Edward J. Delp III
2001 Security and Watermarking of Multimedia Contents III  
In this paper, we address the issues involved in the watermarking of rate-scalable video streams delivered using a practical network.  ...  Many watermarking techniques have been proposed for digital images and video, but the issues of streaming have not been fully investigated.  ...  Video Watermarking Watermark embedding in the compressed domain (inserting the watermark directly into the compressed bit stream) has the advantage in that the watermark embedder can process the compressed  ... 
doi:10.1117/12.435391 dblp:conf/sswmc/LinPKD01 fatcat:5ov2qpdigvhi7jqpudz3f5rlii

Streaming video and rate scalable compression: what are the challenges for watermarking?

Christine I. Podilchuk
2004 Journal of Electronic Imaging (JEI)  
In this paper, we address the issues involved in the watermarking of rate-scalable video streams delivered using a practical network.  ...  Many watermarking techniques have been proposed for digital images and video, but the issues of streaming have not been fully investigated.  ...  Video Watermarking Watermark embedding in the compressed domain (inserting the watermark directly into the compressed bit stream) has the advantage in that the watermark embedder can process the compressed  ... 
doi:10.1117/1.1632499 fatcat:u2ynx65f5fgw5mzb7kelxui66q

Robust Image Watermarking Theories and Techniques: A Review

Hai Tao, Li Chongmin, Jasni Mohamad Zain, Ahmed N. Abdalla
2014 Journal of Applied Research and Technology  
Moreover, it is concluded that various attacks operators are used for the assessment of watermarking systems, which supplies an automated and fair analysis of substantial watermarking methods for chosen  ...  information encoded in systems where digital content can easily be disseminated through communication channels?  ...  In [20] , collusion and the averaging attacks are discussed in using videos and complementary countermeasures are recommended.  ... 
doi:10.1016/s1665-6423(14)71612-8 fatcat:auyjvhohajg2tmlphnouehkd2q

Robust Video Data Hiding Using Forbidden Zone Data Hiding and Selective Embedding

Ersin Esen, A. A. Alatan
2011 IEEE transactions on circuits and systems for video technology (Print)  
The decoding error values are reported for typical system parameters. The simulation results indicate that the framework can be successfully utilized in video data hiding applications.  ...  Selective embedding is utilized in the proposed method to determine host signal samples suitable for data hiding.  ...  For instance, Tardos fingerprinting [18] , which is a randomized construction of binary fingerprint codes that are optimal against collusion attack, can be employed within the proposed framework with  ... 
doi:10.1109/tcsvt.2011.2134770 fatcat:tf5gy67se5bj7mbywbpdbjkql4

Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking

G. Doerr, J.-L. Dugelay
2004 IEEE Transactions on Signal Processing  
As examples, two very common video watermarking systems will be presented as well as the associated intra-video collusion attacks which defeat them.  ...  However, such a frame-by-frame approach is very risky since straightforward embedding strategies can result in poor performance in terms of security i.e. against hostile attacks.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers and Professor Ton Kalker for their helpful comments which improved the quality of this paper.  ... 
doi:10.1109/tsp.2004.833867 fatcat:sbdnt7timvabzlqloslzub3r3q

Digital Image Watermarking: A Study on Techniques & Issues

Jobin Abraham
2015 International Journal of Scientific and Engineering Research  
As these illegal activities are becoming more and more common, mechanisms to protect digital resources are in high demand.  ...  Watermarking is an effective method for restricting abuses of published digital contents and to protect ownership rights of the owner.  ...  Different approaches are required for each case as the format used for image, audio and video is dissimilar.  ... 
doi:10.14299/ijser.2015.12.010 fatcat:ad7e6rx7gjfwnp6hs5w5ybpnv4

Video content authentication techniques: a comprehensive survey

Raahat Devender Singh, Naveen Aggarwal
2017 Multimedia Systems  
Ten real-world videos were used to judge the performance of the technique and the results suggested that it was resilient to MPEG-2 compression and re-compression.  ...  observed in other fields of digital video processing.  ... 
doi:10.1007/s00530-017-0538-9 fatcat:26btbnxevzgblpxstjh3cha77q

Improving the Security of the Chien-Jan Protocol for Large Mobile Networks

Chao-Wen Chan, Rong-Yuan Wang
2007 Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007)  
An Iterative Method for Lossless Data Embedding in BMP Images IIH-MSP 2007-0864 Jia-Hong Lee and Mei-Yi Wu IIH-MSP 2007-1160 A Novel Scheme for Watermarking Natural Language Text Eyes Tracking in a Video  ...  Scheme for MP3 Copyright DESIGN OF MULTIUSER COLLUSION-FREE HIDING CODES WITH DELAYED EMBEDDING Che-Jen Hsieh , Jung-Shian Li and Cheng-Fu Hung IIH-MSP 2007-0284 Byung-Ho Cha and C.  ... 
doi:10.1109/iihmsp.2007.4457537 dblp:conf/iih-msp/ChanW07 fatcat:jjurabaaqvem7eqbe5ewkzacfy

How to Combat Block Replacement Attacks? [chapter]

Gwenaël Doërr, Jean-Luc Dugelay
2005 Lecture Notes in Computer Science  
Finally, experimental results will be presented and directions for future work will be discussed.  ...  This can be achieved by imposing a linear structure on the watermark in a feature space e.g. the Gabor space.  ...  Acknowledgment This work has been supported in part by the European Commission through the IST Program under Contract IST-2002-507932 ECRYPT.  ... 
doi:10.1007/11558859_13 fatcat:scuaijxom5ab3omxlybjqbxb44

Low-complexity methods for image and video watermarking

Lino Evgueni Coria Mendoza
In these methods, the video is watermarked so that its display is not permitted if a compliant video player detects the watermark.  ...  A watermark that is robust to geometric distortions (rotation, scaling, cropping) and lossy compression is required in order to block access to media content that has been recorded with a camera inside  ...  The topic of anti-collusion forensics for fingerprinting applications has been explored in [44] . In this approach, the spread spectrum additive embedding technique is used.  ... 
doi:10.14288/1.0066313 fatcat:dhew4ivfsvfk5p7b365bh26jha

Special Issue: Multimedia Information System Security

Shiguo Lian, Dimitris Kanellopoulos, Giancarlo Ruffo, Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Editorial Board, Juan Carlos, Augusto, Argentina (+29 others)
2009 unpublished
Acknowledgement This work was supported by the Slovenian Research Agency (ARRS), development project M2-0210 (C) entitled "AvID: Audiovisual speaker identification and emotion detection for secure communications  ...  In desynchronized fingerprinting [54] , the multimedia content (e.g., image or video) is desynchronized imperceptibly with some geometric operations in order to make each copy different from others.  ...  Collusion attacks The most serious threat to watermarking-based fingerprinting is collusion attack.  ... 

Vulnerabilities and Attacks Against Industrial Control Systems and Critical Infrastructures [article]

Georgios Michail Makrakis, Constantinos Kolias, Georgios Kambourakis, Craig Rieger, Jacob Benjamin
2021 arXiv   pre-print
physical processes.  ...  Yet, as OT systems progressively become more and more interconnected, they silently have turned into alluring targets for diverse groups of adversaries.  ...  The limit for resilience is the point where a system cannot perform its desired process. One of the most crucial aspects of resiliency is recovery.  ... 
arXiv:2109.03945v2 fatcat:5iyplw4lhrfnffhncykxz4hyzi

Strategies for Unbridled Data Dissemination: An Emergency Operations Manual

Nikita Mazurov
the form of audio, video and text-based watermarking technologies.  ...  The project finds that both legal and technical mechanisms for restricting the flow of content can be countervailed, which in turn leads to the development of different control mechanisms and in turn engenders  ...  The rigid segmentarity manifests itself via the forced cleaving of the film's body into select frames selected frames (chosen for their resiliency in high-compression encoding environments), upon which  ... 
doi:10.25602/gold.00016589 fatcat:3szv2ve46jb3blsoaalxp5rk7m
« Previous Showing results 1 — 15 out of 16 results