Towards the Public but Noninvertible Watermarking
The public watermarking schemes, which do not need the originals in ownership verification, have been proved invertible in nature. However, this paper is to demonstrate that some public but noninvertible schemes exist in the cases of the ill-posed linear embedding or nonlinear embedding. Since attackers have to solve an ill-posed linear or nonlinear system, they have great difficulty dividing a released version into their claimed original data and scaled watermarks, and in the meantime making the latter be the particular adaptive results based on the former. Since the inverted solutions are drastically perturbed and perceptually unacceptable, they can fail to cheat the private schemes. Furthermore, because the owner has the embedded watermark which jointly defines the embedding system, he or she can do the reverse engineering more precisely and ultimately differentiate himself or herself from the attackers in a public scheme, achieving the public but noninvertible schemes.
KeywordsReverse Engineering Image Watermark Watermark Scheme Linear Feedback Shift Register Embed Watermark
Unable to display preview. Download preview PDF.
- 3.Kutter, M., Petitcolas, F.: A fair benchmark for image watermarking systems. In: SPIE Proc. of Security and Watermarking of Multimedia Contents, April 1999, vol. 3657, pp. 226–239 (1999)Google Scholar
- 5.Craver, S., Memon, N., Yeo, B.L., Yeung, M.M.: On the invertibility of invisible watermarking techniques. In: Proc. of 1997 International Conference on Image Processing of IEEE Signal Processing Society, October 1997, vol. 3, pp. 540–543 (1997)Google Scholar
- 7.Qiao, L., Nahrstedt, K.: Watermarking methods for MPEG encoded video: Towards resolving rightful ownership. In: Proc. of IEEE International Conference on Multimedia Computing and Systems, June 1998, pp. 276–285 (1998)Google Scholar
- 9.Cox, I.J., Miller, M.I.: A review of watermarking and the importance of perceptual modeling. In: SPIE Proc. of Human Vision and Elec. Imaging, February 1997, vol. 3016, pp. 92–99 (1997)Google Scholar
- 12.Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for images, audio and video. In: Proc. of IEEE International Conference on Image Processing (ICIP 1996), Septemper 1996, vol. 3, pp. 243–246 (1996)Google Scholar
- 13.Castleman, K.R.: Digital Image Processing, 2nd edn. Prentice Hall Inc., Englewood Cliffs (1997)Google Scholar