Learn More
1 Research on information embedding and particularly information hiding techniques has received considerable attention within the last years due to its potential application in multimedia security. Digital watermarking, which is an information hiding technique where the embedded information is robust against malicious or accidental attacks , might offer new(More)
Digital watermarks are signals embedded in multimedia data to allow copyright enforcement. In most watermarking schemes the embedded signal must be known for watermark detection, which leads to severe security risks. Van Schyndel et al. proposed a public watermark detection principle that works without explicit reference to the embedded signal. In this(More)
One envisioned application of digital watermarking is fingerprinting , in which different information is embedded into several copies of the same original signal. Several attackers may collude by combining their copies to produce an attacked signal. In the case of independent watermarks, a collusion-attack model is presented and shown to be analogous to the(More)
Recently it was shown that, in some situations, blind watermarking can perform as well as watermarking schemes with the host signal available to the decoder. In this paper, blind watermarking of colored Gaussian host signals in the presence of filtering and additive Gaussian noise attacks is discussed. Three suboptimal but practical schemes are compared(More)
New blind digital watermarking schemes that are optimized for additive white Gaussian noise (AWGN) attacks have been developed by several research groups within the last two years. Currently, the most ef£cient schemes, e.g., the scalar Costa scheme (SCS), involve scalar quantization of the host signal during watermarking embedding and watermark reception.(More)
Using a theoretical approach based on random processes, signal processing, and information theory, we study the performance of digital watermarks subjected to an attack consisting of linear shift-invariant "ltering and additive colored Gaussian noise. Watermarking is viewed as communication over a hostile channel, where the attack takes place. The attacker(More)
Scalar Costa Scheme (SCS) watermarking is a practical version of Costa's capacity achieving blind watermarking scheme. In this paper, inversion of SCS, that is the removal of the embedded signal, is investigated. For the noiseless case, where no attack is performed on the watermarked data, SCS watermarking can be inverted perfectly. For the case of an AWGN(More)