Font Size: a A A

IBM Attack And Its Resisting Approach For Copyright Protection In Watermarking

Posted on:2007-09-04Degree:MasterType:Thesis
Country:ChinaCandidate:W L WangFull Text:PDF
GTID:2178360182994147Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Digital watermarks have been proposed in recent literature as the approach for copyright protection of multimedia data. For its invisibility, validity and robustness, digital watermark is an effective Post Architecture approach for personality identification and information trace. The watermark used for copyright protection is related to the watermark scheme and copyright protection laws.Multiple claims of the rightful ownership for a digital product, also called the IBM attack, are the threshold for the watermarking usage in the copyright protection. In the normal feature-based algorithms, the feature extractors are decided by the watermarking scheme and open to the public, so the watermarked features are exposed to attackers and the watermarking scheme is vulnerable. At the same time, the inserted watermarks are irrespective for each other and we can not ensure the One-Way characteristic of the algorithm, so the IBM attack is possible. In the paper, our feature extractors and inserted watermarks are decided by the watermarking content and transparent to the public, so attackers can not extract the watermarked features from the watermarked multimedia data and do the modification. And the inserted signature is interrelated with the feature extractors, extracted features and original un-watermarked multimedia, so attackers are impossible to fabricate effective watermarks.To resolve the IBM attack brought by the multiple watermarks in a digital product, we divide the copyright protection system into watermarking algorithm and watermarking deploying strategy two parts in the paper. When they cooperate well, the validity and completeness of the system can be resolved.
Keywords/Search Tags:Copyright Protection, IBM Attack, Protection for Multiple Claim s of Rightful Ownership, One-Way Characteristic Watermarking Algorithm, Feature-based Watermarking, Dynamic Feature-based Watermarking, Watermarking Deploying Strategies
PDF Full Text Request
Related items