Abstract
To overcome the reversibility of the widely researched adaptive watermarking, the existing method based on cryptography is first directly revised for adaptive systems. The intrinsic irreversibility of some adaptive technologies is then disclosed and evaluated. Under these technologies, attackers have great difficulty dividing a released version into their claimed original data and scaled watermarks, and in the meantime making the latter be the particular adaptive results based on the former. Their reversed solutions are violently perturbed and perceptually unacceptable. The condition number of the coefficient matrix of the reverse equations can be employed to assess the degree of the perturbation. The proposed method is more efficient because it disposes of any cryptographic processing, such as hashing and stream generation. The experiments on images support the theoretic conclusion well.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
G. C. Langelaar, I. Setyawan, R. L. Lagendijk. Watermarking digital image and video data, a state-of-the-art overview. IEEE Signal Processing Magazine, 17(5): 20–46, 2000.
J. K. Su, F. Hartung, B. Girod. Digital watermarking of text, image, and video documents. Computers & Graphics, 22(6): 687–695, 1998.
I. J. Cox, J. M. G. Linnartz. Some general methods for tempering with watermarks. IEEE Journal on Selected Areas in Communications, 6(4): 587–593, 1998.
M. Kutter, F. Petitcolas. A fair benchmark for image watermarking systems. In: SPIE Proc. of Security and Watermarking of Multimedia Contents, vol. 3657: 226–239, Apr. 1999.
A. J. Menezes, P. C. van Oorschot, S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, Florida, 1997.
S. Craver, N. Memon, B. L. Yeo, M. M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications. IEEE Journal on Selected Areas in Communications, 16(4): 573–586, 1998.
S. Craver, N. Memon, B. L. Yeo, M. M. Yeung. On the invertibility of invisible watermarking techniques. In: Proc. of 1997 International Conference on Image Processing of IEEE Signal Processing Society, vol. 3: 540–543, Oct. 1997.
L. Qiao, K. Nahrstedt. Watermarking methods for MPEG encoded video: Towards resolving rightful ownership. In: Proc. of IEEE International Conference on Multimedia Computing and Systems, 276–285, Jun. 1998.
I. J. Cox, M. I. Miller. A review of watermarking and the importance of perceptual modeling. In: SPIE Proc. of Human Vision and Electronic Imaging II, vol. 3016: 92–99, Feb. 1997.
D. C. Wu, W. H. Tsai. Embedding of any type of data in images based on a human visual model and multiple-based number conversion. Pattern Recognition Letters, 20(1999): 1511–1517, 1999.
M. D. Swanson, B. Zhu, A. H. Tewfik, L. Boney. Robust audio watermarking using perceptual masking. Signal Processing, 66(1998): 337–355, 1998.
K. R. Castleman. Digital image processing (2nd ed.). Prentice Hall, Inc., Englewood Cliffs, New Jersey, 1997.
P. Lancaster, M. Tismenetsky. The theory of matrix (2nd ed.). Academic Press, Inc., Orlando, Florida, 1985.
R. L. Burden, J. D. Faires. Numerical analysis (7th ed.). Thomson Learning, Inc., Stamford, Connecticut, 2001.
I. J. Cox, J. Kilian, T. Leighton, T. Shamoon. Secure spread spectrum watermarking for images, audio and video. In: Proc. of IEEE International Conference On Image Processing (ICIP’96), vol. 3: 243–246, Sept. 1996.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhao, X., Wang, W., Chen, K. (2002). Exploiting the Intrinsic Irreversibility of Adaptive Technologies to Enhance the Security of Digital Watermarking. In: Meng, X., Su, J., Wang, Y. (eds) Advances in Web-Age Information Management. WAIM 2002. Lecture Notes in Computer Science, vol 2419. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45703-8_40
Download citation
DOI: https://doi.org/10.1007/3-540-45703-8_40
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44045-1
Online ISBN: 978-3-540-45703-9
eBook Packages: Springer Book Archive