DocumentCode
966077
Title
Watermarking Scheme Capable of Resisting Sensitivity Attack
Author
Zhang, Xinpeng ; Wang, Shuozhong
Author_Institution
Sch. of Commun. & Inf. Eng, Shanghai Univ.
Volume
14
Issue
2
fYear
2007
Firstpage
125
Lastpage
128
Abstract
In sensitivity attacks, attempts across the boundary between "watermarked" and "not watermarked" using an available detector can provide adequate information about an embedded watermark for clearing it without causing serious distortion. This letter proposes a novel watermarking system capable of resisting such sensitivity attacks, which contains a tailor-made embedding algorithm and a corresponding detecting method. Although an attacker can still find the most effective way for destroying the watermark in a constructed signal near the boundary, it is impossible to move a watermarked product away from the "watermarked" region with low distortion. Therefore, the watermark detector can be widely distributed without fear of being used for sensitivity attacks
Keywords
data encapsulation; image coding; watermarking; detecting method; embedding algorithm; sensitivity attack; watermarking scheme; Algorithm design and analysis; Delay; Detectors; Distortion; Fractals; Intellectual property; Iterative methods; Object detection; Signal processing algorithms; Watermarking; Detector; digital watermarking; sensitivity attack;
fLanguage
English
Journal_Title
Signal Processing Letters, IEEE
Publisher
ieee
ISSN
1070-9908
Type
jour
DOI
10.1109/LSP.2006.882092
Filename
4063373
Link To Document