TY - JOUR KW - Copy attack KW - cryptography KW - Visibility function KW - Watermarking AU - Ajay Goel AU - O .P.Sahu AU - Aman Soni AU - Punit Soni AB -

Watermarking is a potential method for protection of ownership rights on digital audio, image and video data. In watermarking terminology, an attack is any processing that may impair detection of the watermark or communication of the information conveyed by the watermark. The processed, watermarked data is then called attacked data. An attack succeeds in defeating a watermarking scheme if it impairs the watermark beyond acceptable limits while maintaining the perceptual quality of the attacked data. In this paper we present a number of attacks that enable the information hidden by them to be removed or otherwise rendered unusable. The latest attacks do not destroy an embedded watermark, but copies it from one image to a different image. Finally, we summarise the current work of the attacks in watermarking and focus on the copy attack on robust digital watermarking schemes.

BT - Information & Security: An International Journal DA - 2011 IS - 1 LA - eng N2 -

Watermarking is a potential method for protection of ownership rights on digital audio, image and video data. In watermarking terminology, an attack is any processing that may impair detection of the watermark or communication of the information conveyed by the watermark. The processed, watermarked data is then called attacked data. An attack succeeds in defeating a watermarking scheme if it impairs the watermark beyond acceptable limits while maintaining the perceptual quality of the attacked data. In this paper we present a number of attacks that enable the information hidden by them to be removed or otherwise rendered unusable. The latest attacks do not destroy an embedded watermark, but copies it from one image to a different image. Finally, we summarise the current work of the attacks in watermarking and focus on the copy attack on robust digital watermarking schemes.

PY - 2011 SE - 27 SP - 27 EP - 33 T2 - Information & Security: An International Journal TI - A Copy Attack on Robust Digital Watermarking in Multi Domain for the Stego Images VL - 26 ER -