메뉴 건너뛰기




Volumn , Issue , 2004, Pages 133-142

Exploiting self-similarities to defeat digital watermarking systems a case study on still images

Author keywords

Block replacement attack; Intra signal collusion; Self similarities

Indexed keywords

ANALOG TO DIGITAL CONVERSION; COPYRIGHTS; CRYPTOGRAPHY; IMAGE PROCESSING; MULTIMEDIA SYSTEMS; RELIABILITY; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA;

EID: 14844334167     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (14)

References (40)
  • 2
    • 14844294682 scopus 로고    scopus 로고
    • Certimark. http://www.certimark.org.
  • 3
    • 14844296809 scopus 로고    scopus 로고
    • Checkmark, http://watermarking.unige.ch/checkmark.
    • Checkmark
  • 8
    • 4744372403 scopus 로고    scopus 로고
    • Secure background watermarking based on video mosaicing
    • Security, Steganography and Watermarking of Multimedia Contents VI, January
    • G. Doërr and J.-L. Dugelay. Secure background watermarking based on video mosaicing. In Security, Steganography and Watermarking of Multimedia Contents VI, volume 5306 of Proceedings of SPIE, January 2004.
    • (2004) Proceedings of SPIE , vol.5306
    • Doërr, G.1    Dugelay, J.-L.2
  • 10
    • 14844307684 scopus 로고    scopus 로고
    • DVD Copy Control Association, http://www.dvdcca.org.
  • 13
    • 0033601672 scopus 로고    scopus 로고
    • Spread spectrum watermarking: Malicious attacks and counterattacks
    • Security and Watermarking of Multimedia Contents, January
    • F. Hartung, J. Su, and B. Girod. Spread spectrum watermarking: Malicious attacks and counterattacks. In Security and Watermarking of Multimedia Contents, volume 3657 of Proceedings of SPIE, pages 147-158, January 1999.
    • (1999) Proceedings of SPIE , vol.3657 , pp. 147-158
    • Hartung, F.1    Su, J.2    Girod, B.3
  • 14
    • 0034775170 scopus 로고    scopus 로고
    • The watermark template attack
    • Security and Watermarking of Multimedia Contents III, January
    • A. Herrigel, S. Voloshynovskiy, and Y. Rytsar. The watermark template attack. In Security and Watermarking of Multimedia Contents III, volume 4314 of Proceedings of SPIE, pages 394-405, January 2001.
    • (2001) Proceedings of SPIE , vol.4314 , pp. 394-405
    • Herrigel, A.1    Voloshynovskiy, S.2    Rytsar, Y.3
  • 15
    • 0033703673 scopus 로고    scopus 로고
    • Robust frame-dependent video watermarking
    • Security and Watermarking of Multimedia Contents II, January
    • M. Holliman, W. Macy, and M. Yeung. Robust frame-dependent video watermarking. In Security and Watermarking of Multimedia Contents II, volume 3971 of Proceedings of SPIE, pages 186-197, January 2000.
    • (2000) Proceedings of SPIE , vol.3971 , pp. 186-197
    • Holliman, M.1    Macy, W.2    Yeung, M.3
  • 18
    • 14844330359 scopus 로고
    • Digital compression and coding of continuous-tone still images
    • JPEG Standard. ISO/IEC, February
    • JPEG Standard. Digital compression and coding of continuous-tone still images. In JTC1/SC29/WG1 10918-1. ISO/IEC, February 1994.
    • (1994) JTC1/SC29/WG1 10918-1
  • 19
    • 84947260435 scopus 로고    scopus 로고
    • Robust covert communication over a public audio channel using spread spectrum
    • Proceedings of the Fourth International Workshop on Information Hiding, April
    • D. Kirovski and H. Malvar. Robust covert communication over a public audio channel using spread spectrum. In Proceedings of the Fourth International Workshop on Information Hiding, volume 2137 of Lecture Notes on Computer Science, pages 354-368, April 2001.
    • (2001) Lecture Notes on Computer Science , vol.2137 , pp. 354-368
    • Kirovski, D.1    Malvar, H.2
  • 20
    • 0038104797 scopus 로고    scopus 로고
    • Blind pattern matching attack on watermarking systems
    • April
    • D. Kirovski and F. Petitcolas. Blind pattern matching attack on watermarking systems. IEEE Transactions on Signal Processing, 51(4):1045-1053, April 2003.
    • (2003) IEEE Transactions on Signal Processing , vol.51 , Issue.4 , pp. 1045-1053
    • Kirovski, D.1    Petitcolas, F.2
  • 21
    • 35248891551 scopus 로고    scopus 로고
    • Replacement attack on arbitrary watermarking systems
    • Proceedings of the ACM Digital Rights Management Workshop, July
    • D. Kirovski and F. Petitcolas. Replacement attack on arbitrary watermarking systems. In Proceedings of the ACM Digital Rights Management Workshop, volume 2696 of Lecture Notes on Computer Science, pages 177-189, July 2003.
    • (2003) Lecture Notes on Computer Science , vol.2696 , pp. 177-189
    • Kirovski, D.1    Petitcolas, F.2
  • 22
    • 0032653659 scopus 로고    scopus 로고
    • Watermarking resisting to translation, rotation and scaling
    • Multimedia Systems and Applications, November
    • M. Kutter. Watermarking resisting to translation, rotation and scaling. In Multimedia Systems and Applications, volume 3528 of Proceedings of SPIE, pages 423-431, November 1998.
    • (1998) Proceedings of SPIE , vol.3528 , pp. 423-431
    • Kutter, M.1
  • 23
    • 0033601691 scopus 로고    scopus 로고
    • A fair benchmark for image watermarking systems
    • Security and Watermarking of Multimedia Contents, January
    • M. Kutter and F. Petitcolas. A fair benchmark for image watermarking systems. In Security and Watermarking of Multimedia Contents, volume 3657 of Proceedings of SPIE, pages 226-239, January 1999.
    • (1999) Proceedings of SPIE , vol.3657 , pp. 226-239
    • Kutter, M.1    Petitcolas, F.2
  • 26
    • 14844283254 scopus 로고    scopus 로고
    • OpenWatermark. http://www.openwatermark.org.
  • 27
    • 14844295926 scopus 로고    scopus 로고
    • Optimark. http://poseidon.csd.auth.gr/optimark.
    • Optimark
  • 28
    • 0032074148 scopus 로고    scopus 로고
    • Rotation, scale and translation invariant digital image watermarking
    • May
    • J. Ó Ruanaidh and T. Pun. Rotation, scale and translation invariant digital image watermarking. Signal Processing, 68(3):303-317, May 1998.
    • (1998) Signal Processing , vol.68 , Issue.3 , pp. 303-317
    • Ruanaidh, J.O.1    Pun, T.2
  • 29
    • 84957877979 scopus 로고    scopus 로고
    • Attacks on copyright marking systems
    • Proceedings of the Second International Workshop on Information Hiding, April
    • F. Petitcolas, R. Anderson, and M. Kuhn. Attacks on copyright marking systems. In Proceedings of the Second International Workshop on Information Hiding, volume 1525 of Lecture Notes on Computer Science, pages 219-239, April 1998.
    • (1998) Lecture Notes on Computer Science , vol.1525 , pp. 219-239
    • Petitcolas, F.1    Anderson, R.2    Kuhn, M.3
  • 33
    • 35048819204 scopus 로고    scopus 로고
    • Model-based steganography
    • Proceedings of the Second International Workshop on Digital Watermarking, October
    • P. Sallee. Model-based steganography. In Proceedings of the Second International Workshop on Digital Watermarking, volume 2939 of Lecture Notes in Computer Science, pages 154-167, October 2003.
    • (2003) Lecture Notes in Computer Science , vol.2939 , pp. 154-167
    • Sallee, P.1
  • 34
    • 14844287748 scopus 로고    scopus 로고
    • Secure Digital Music Initiative, http://www.sdmi.org.
  • 35
    • 14844338297 scopus 로고    scopus 로고
    • Stirmark. http://www.petitcolas.net/fabien/watermarking/stirmark.
    • Stirmark
  • 36
    • 0036999125 scopus 로고    scopus 로고
    • Power-spectrum condition for energy-efficient watermarking
    • December
    • J. Su and B. Girod. Power-spectrum condition for energy-efficient watermarking. IEEE Transactions on Multimedia, 4(4):551-560, December 2002.
    • (2002) IEEE Transactions on Multimedia , vol.4 , Issue.4 , pp. 551-560
    • Su, J.1    Girod, B.2
  • 37
    • 0033688391 scopus 로고    scopus 로고
    • Generalized watermarking attack based on watermark estimation and perceptual remodulation
    • Security and Watermarking of Multimedia Contents II, January
    • S. Voloshynovskiy, S. Pereira, A. Herrigel, N. Baumgärtner, and T. Pun. Generalized watermarking attack based on watermark estimation and perceptual remodulation. In Security and Watermarking of Multimedia Contents II, volume 3971 of Proceedings of SPIE, pages 358-370, January 2000.
    • (2000) Proceedings of SPIE , vol.3971 , pp. 358-370
    • Voloshynovskiy, S.1    Pereira, S.2    Herrigel, A.3    Baumgärtner, N.4    Pun, T.5
  • 38
    • 0035369792 scopus 로고    scopus 로고
    • Attack modeling: Towards a second generation watermarking benchmark
    • June
    • S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun. Attack modeling: Towards a second generation watermarking benchmark. Signal Processing, 81(6):1177-1214, June 2001.
    • (2001) Signal Processing , vol.81 , Issue.6 , pp. 1177-1214
    • Voloshynovskiy, S.1    Pereira, S.2    Iquise, V.3    Pun, T.4
  • 39
    • 14844314068 scopus 로고    scopus 로고
    • Contact Professor E. Delp, Purdue University, USA
    • Watermark Evaluation Testbed (WET). Contact Professor E. Delp, Purdue University, USA.
    • Watermark Evaluation Testbed (WET)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.