31 July 2002 Using intrinsically irreversible adaptive technologies to counteract the deceptions in digital watermarking
Author Affiliations +
Proceedings Volume 4875, Second International Conference on Image and Graphics; (2002); doi: 10.1117/12.477136
Event: Second International Conference on Image and Graphics, 2002, Hefei, China
Abstract
To effectively counteract the deceptions in multimedia ownership verification, the reversibility in the widely used and researched adaptive watermarking is investigated from a new point of view. The reversibility, together with its resulting attacks, is introduced and extended to adaptive systems. The mostly typical existing counteraction is revised and its potential is pointed out. Then, the intrinsic irreversibility of some adaptive technologies is disclosed and evaluated. Under these technologies, attackers have great difficulty dividing a released version into their claimed original data and scaled watermarks, and in the meantime making the latter be the adaptive results based on the former. Their reversed solutions are violently perturbed and perceptually unacceptable. The condition number of the coefficient matrix of the reverse equations can be employed to assess the degree of the perturbation. The experiments that use the proper adaptive filter to enlarge the condition number force the attackers to solve the difficult problems in algebra and signal processing. Instead of using specialized security processing, such as hashing and randomization, they exploit the irreversible nature of chosen technologies so that a more feasible irreversible watermarking scheme is achieved.
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Xianfeng Zhao, Weinong Wang, Kefei Chen, "Using intrinsically irreversible adaptive technologies to counteract the deceptions in digital watermarking", Proc. SPIE 4875, Second International Conference on Image and Graphics, (31 July 2002); doi: 10.1117/12.477136; https://doi.org/10.1117/12.477136
PROCEEDINGS
8 PAGES


SHARE
KEYWORDS
Digital watermarking

Lutetium

Condition numbers

Reverse engineering

Computer security

Digital filtering

Information security

Back to Top