Some general methods for tampering with watermarks
نویسندگان
چکیده
Watermarks allow embedded signals to be extracted from audio and video content for a variety of purposes. One application is for copyright control, where it is envisaged that digital video recorders will not permit the recording of content that is watermarked as “never copy”. In such a scenario, it is important that the watermark survive both normal signal transformations and attempts to remove the watermark so that an illegal copy can be made. In this paper, we discuss to what extent a watermark can be resistant to tampering and describe a variety of possible attacks.
منابع مشابه
A review of watermarking principles and practices
A digital watermark embeds an imperceptible signal into data such as audio, video and images, for a variety of purposes, including captioning and copyright control. As watermarking is increasingly used for a wide variety ∗Portions of this paper appeared in the Proceedings of SPIE, Human Vision & Electronic Imaging II, V 3016, pp 92-99, February 1997. Portions are reprinted, with permission, fro...
متن کاملTampering Detection Scheme for Speech Signals using Formant Enhancement Based Watermarking
Unauthorized tampering in speech signals has brought serious problems when verifying their originality and integrity. Digital watermarking can effectively check if the original speech signals have been tampered by embedding digital data into them. To be effective, watermarking method should be implemented according to four requirements of (1) inaudibility to human auditory system, (2) blindness...
متن کاملDetecting tampering in audio-visual content using QIM watermarking
This paper presents a framework for detecting tampered information in digital audio-visual content. The proposed framework uses a combination of temporal and spatial watermarks that do not decrease the quality of host videos. A modified version of the Quantization Index Modulation (QIM) algorithm is used to embed watermarks. The fragility of the QIM watermarking algorithm makes it possible to d...
متن کاملEnsuring Media Integrity on Third-Party Infrastructures
In many heterogeneous networked applications the integrity of multimedia data plays an essential role, but is not directly supported by the application. In this paper, we propose a method which enables an individual user to detect tampering with a multimedia file without changing the software application provided by the third party. Our method is based on a combination of cryptographic signatur...
متن کاملFormant enhancement based speech watermarking for tampering detection
Unauthorized tampering in speech signals has brought serious problems when verifying the originality and integrity of speech signals. Digital watermarking can effectively check if the original signals have been tampered by embedding digital data into them. This paper proposes a tampering detection scheme for speech signals based on formant enhancement-based watermarking. Watermarks are embedded...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Journal on Selected Areas in Communications
دوره 16 شماره
صفحات -
تاریخ انتشار 1998