Abstract
In recent literature many strategies for attacking and subverting a watermark have been presented. Such attacks suggest that the ability to embed non-erasable watermarks does not necessarily imply that the watermarking scheme can be used to establish ownership. The main aim of this paper is to formulate necessary and sufficient requirements for a watermarking scheme to be able to resolve rightful ownership. It is shown that some of the popular schemes proposed in literature for watermarking images do not satisfy these requirements. Finally, we show that a modification of a watermarking scheme in literature [1] performs satisfactorily.
Original language | English (US) |
---|---|
Pages | 414-418 |
Number of pages | 5 |
State | Published - Dec 1 1998 |
Event | Proceedings of the 1998 International Conference on Image Processing, ICIP. Part 2 (of 3) - Chicago, IL, USA Duration: Oct 4 1998 → Oct 7 1998 |
Other
Other | Proceedings of the 1998 International Conference on Image Processing, ICIP. Part 2 (of 3) |
---|---|
City | Chicago, IL, USA |
Period | 10/4/98 → 10/7/98 |
ASJC Scopus subject areas
- Hardware and Architecture
- Computer Vision and Pattern Recognition
- Electrical and Electronic Engineering