• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

Electronic marking and identification techniques to discourse document copying”, Proceeding of INFOCOM. (1994)

by J Brassil, S Low, N Maxemchuk, L O’ Gorman
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 136
Next 10 →

Secure spread spectrum watermarking for multimedia

by Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, Talal Shamoon - IEEE TRANSACTIONS ON IMAGE PROCESSING , 1997
"... This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gauss ..."
Abstract - Cited by 1100 (10 self) - Add to MetaCart
This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. We argue that insertion of a watermark under this regime makes the watermark robust to signal processing operations (such as lossy compression, filtering, digital-analog and analog-digital conversion, requantization, etc.), and common geometric transformations (such as cropping, scaling, translation, and rotation) provided that the original image is available and that it can be succesfully registered against the transformed watermarked image. In these cases, the watermark detector unambiguously identifies the owner. Further, the use of Gaussian noise, ensures strong resilience to multiple-document, or collusional, attacks. Experimental results are provided to support these claims, along with an exposition of pending open problems.

Collusion-Secure Fingerprinting for Digital Data

by Dan Boneh, James Shaw - IEEE Transactions on Information Theory , 1996
"... This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data (e.g., software, documents, and images). Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy and trac ..."
Abstract - Cited by 353 (1 self) - Add to MetaCart
This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data (e.g., software, documents, and images). Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy and trace it back to the user. This threat of detection will hopefully deter users from releasing unauthorized copies. A problem arises when users collude: For digital data, two different fingerprinted objects can be compared and the differences between them detected. Hence, a set of users can collude to detect the location of the fingerprint. They can then alter the fingerprint to mask their identities. We present a general fingerprinting solution which is secure in the context of collusion. In addition, we discuss methods for distributing fingerprinted data. 1 Introduction Fingerprinting is an old cryptographic technique. For instance, several hundred years ago logarithm tables were protec...

Multimedia Watermarking Techniques

by Frank Hartung, Martin Kutter , 1999
"... ..."
Abstract - Cited by 349 (5 self) - Add to MetaCart
Abstract not found

Information Hiding -- A Survey

by Fabien A. P. Petitcolas, Ross J. Anderson, Markus G. Kuhn , 1999
"... Information hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorised ..."
Abstract - Cited by 295 (0 self) - Add to MetaCart
Information hiding techniques have recently become important in a number of application areas. Digital audio, video, and pictures are increasingly furnished with distinguishing but imperceptible marks, which may contain a hidden copyright notice or serial number or even help to prevent unauthorised copying directly. Military communications systems make increasing use of traffic security techniques which, rather than merely concealing the content of a message using encryption, seek to conceal its sender, its receiver or its very existence. Similar techniques are used in some mobile phone systems and schemes proposed for digital elections. Criminals try to use whatever traffic security properties are provided intentionally or otherwise in the available communications systems, and police forces try to restrict their use. However, many of the techniques proposed in this young and rapidly evolving field can trace their history back to antiquity; and many of them are surprisingly easy to circumvent. In this article, we try to give an overview of the field; of what we know, what works, what does not, and what are the interesting topics for research.

Multimedia dataembedding and watermarking technologies

by Mitchell D. Swanson, Mei Kobayashi, Ahmed H. Tewfik - Proceedings of the IEEE , 1998
"... In this paper, we review recent developments in transparent data embedding and watermarking for audio, image, and video. Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal. The embedded data are perceptually inaudible ..."
Abstract - Cited by 231 (2 self) - Add to MetaCart
In this paper, we review recent developments in transparent data embedding and watermarking for audio, image, and video. Data-embedding and watermarking algorithms embed text, binary streams, audio, image, or video in a host audio, image, or video signal. The embedded data are perceptually inaudible or invisible to maintain the quality of the source data. The embedded data can add features to the host multimedia signal, e.g., multilingual soundtracks in a movie, or provide copyright protection. We discuss the reliability of data-embedding procedures and their ability to deliver new services such as viewing a movie in a given rated version from a single multicast stream. We also discuss the issues and problems associated with copy and copyright protections and assess the viability of current watermarking algorithms as a means for protecting copyrighted data. Keywords—Copyright protection, data embedding, steganography, watermarking. I.
(Show Context)

Citation Context

...spacing between words appears time and again throughout history. Recently, the technique has been revisited in a digital context by scientists who are investigating digital watermarking of text files =-=[6]-=-, [49], [56], [93], [98]. Examples of nontextual semagrams are equally replete. Spies have embedded messages in Morse code in drawings, e.g., landscapes with short and tall leaves of grass representin...

Copy Detection Mechanisms for Digital Documents

by Sergey Brin, James Davis, Hector Garcia-Molina
"... In a digital library system, documents are available in digital form and therefore are more easily copied and their copyrights are more easily violated. This is a very serious problem, as it discourages owners of valuable information from sharing it with authorized users. There are two main philosop ..."
Abstract - Cited by 206 (9 self) - Add to MetaCart
In a digital library system, documents are available in digital form and therefore are more easily copied and their copyrights are more easily violated. This is a very serious problem, as it discourages owners of valuable information from sharing it with authorized users. There are two main philosophies for addressing this problem: prevention and detection. The former actually makes unauthorized use of documents difficult or impossible while the latter makes it easier to discover such activity. In this paper we propose a system for registering documents and then detecting copies, either complete copies or partial copies. We describe algorithms for such detection, and metrics required for evaluating detection mechanisms (covering accuracy, efficiency, and security). We also describe a working prototype, called COPS, describe implementation issues, and present experimental results that suggest the proper settings for copy detection parameters.
(Show Context)

Citation Context

... be superior (protection mechanisms get in the way of honest users, and sales may actually decrease). One possible direction is to incorporate a "watermark" into a document that identifies i=-=ts origin [12, 3, 4, 2]-=-. For example, if we think of the documents as images, we may encode the watermark into a small number of random bits throughout the image. The users would be unaware of where the watermark bits were,...

Watermarking of Uncompressed and Compressed Video

by Frank Hartung, Bernd Girod , 1998
"... this paper, methods for embedding additive digital watermarks into uncompressed and compressed video sequences are presented. The basic principle borrows from spread spectrum communications. It consists of addition of an encrypted, pseudo-noise signal to the video that is invisible, statistically un ..."
Abstract - Cited by 189 (9 self) - Add to MetaCart
this paper, methods for embedding additive digital watermarks into uncompressed and compressed video sequences are presented. The basic principle borrows from spread spectrum communications. It consists of addition of an encrypted, pseudo-noise signal to the video that is invisible, statistically unobtrusive, and robust against manipulations. For practical applications, watermarking schemes operating on compressed video are desirable. A method for watermarking of MPEG-2 encoded video is presented. The scheme is a compatible extension of the scheme operating on uncompressed video. The watermark is generated exactly in the same manner as for uncompressed video, transformed using the discrete cosine transform (DCT) and embedded into the MPEG-2 bitstream without increasing the bit-rate. The watermark can be retrieved from the decoded video and without knowledge of the original, unwatermarked video. Although an existing MPEG-2 bitstream is partly altered, the scheme avoids visible artifacts by addition of a drift compensation signal. The proposed method is robust and of much lower complexity than a complete decoding process followed by watermarking in the pixel domain and re-encoding. Fast implementations exist which have a complexity comparable to a video decoder. Experimental results are given. The scheme is also applicable to other hybrid transform coding schemes like MPEG-1, MPEG-4, H.261, and H.263. Key words: digital watermarking, copyright protection, compressed video, MPEG-2, MPEG-4, DVD Preprint submitted to Elsevier Preprint 1 Introduction With the advent of digital video, issues of copyright protection have become more important, since the duplication of digital video signals does not result in the inherent decrease in quality suffered by analog video. A method ...

A Secure, Robust Watermark for Multimedia

by Ingemar J. Cox, Joe Kilian, Tom Leighton, Talal Shamoon , 1996
"... We describe a digital watermarking method for use in audio, image, video and multimedia data. We argue that a watermark must be placed in perceptually significant components of a signal if it is to be robust to common signal distortions and malicious attack. However, it is well known that modificati ..."
Abstract - Cited by 159 (6 self) - Add to MetaCart
We describe a digital watermarking method for use in audio, image, video and multimedia data. We argue that a watermark must be placed in perceptually significant components of a signal if it is to be robust to common signal distortions and malicious attack. However, it is well known that modification of these components can lead to perceptual degradation of the signal. To avoid this, we propose to insert a watermark into the spectral components of the data using techniques analogous to spread sprectrum communications, hiding a narrow band signal in a wideband channel that is the data. The watermark is difficult for an attacker to remove, even when several individuals conspire together with independently watermarked copies of the data. It is also robust to common signal and geometric distortions such as digital-to-analog and analog-to-digital conversion, resampling, and requantization, including dithering and recompression and rotation, translation, cropping and scaling. The same digit...

Scam: A copy detection mechanism for digital documents

by Narayanan Shivakumar, Hector Garcia-molina - In Digitial Library , 1995
"... Copy detection in Digital Libraries may provide the necessary guarantees for publishers and newsfeed ser-vices to oer valuable on-line data. We consider the case for a registration server that maintains regis-tered documents against which new documents can be checked for overlap. In this paper we pr ..."
Abstract - Cited by 148 (10 self) - Add to MetaCart
Copy detection in Digital Libraries may provide the necessary guarantees for publishers and newsfeed ser-vices to oer valuable on-line data. We consider the case for a registration server that maintains regis-tered documents against which new documents can be checked for overlap. In this paper we present a new scheme for detecting copies based on compar-ing the word frequency occurrences of the new docu-ment against those of registered documents. We also report on an experimental comparison between our proposed scheme and COPS [6], a detection scheme based on sentence overlap. The tests involve over a million comparisons of netnews articles and show that in general the new scheme performs better in detecting documents that have partial overlap.
(Show Context)

Citation Context

... to the document, and this signature can be used to trace the origins of the document. For example, one popular approach is to incorporate watermarks such as word spacings and checksum into documents =-=[5, 4, 22, 7, 3]-=-. Signature schemes have two weaknesses: (a) the signatures often can be removed automatically, leading to untraceable documents, and (b) they are not useful for detecting partial overlap. For these r...

Digital Watermarks for Audio Signals

by Laurence Boney, Ahmed H. Tewfik, Khaled N. Hamdy - International Conference on Multimedia Computing and Systems , 1996
"... In this paper, we present a novel technique for embedding digital "watermarks" into digital audio signals. Watermarking is a technique used to label digital media by hiding copyright or other information into the underlying data. The watermark must be imperceptible and should be robust to ..."
Abstract - Cited by 119 (2 self) - Add to MetaCart
In this paper, we present a novel technique for embedding digital "watermarks" into digital audio signals. Watermarking is a technique used to label digital media by hiding copyright or other information into the underlying data. The watermark must be imperceptible and should be robust to attacks and other types of distortion. In addition, the watermark also should be undetectable by all users except the author of the piece. In our method, the watermark is generated by filtering a PN-sequence with a filter that approximates the frequency masking characteristics of the human auditory system (HAS). It is then weighted in the time domain to account for temporal masking. We discuss the detection of the watermark and assess the robustness of our watermarking approach to attacks and various signal manipulations. 1 Introduction In today's digital world, there is a great wealth of information which can be accessed in various forms: text, images, audio, and video. It is easy to ensure the sec...
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University