CFP last date
20 January 2025
Reseach Article

Watermark Attacks And Applications in Watermarking

Published on May 2012 by Sunesh, Harish Kumar
National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
Foundation of Computer Science USA
RTMC - Number 10
May 2012
Authors: Sunesh, Harish Kumar
d611de6f-4b95-47c5-9c5c-847783a74d68

Sunesh, Harish Kumar . Watermark Attacks And Applications in Watermarking. National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 10 (May 2012), 16-20.

@article{
author = { Sunesh, Harish Kumar },
title = { Watermark Attacks And Applications in Watermarking },
journal = { National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 },
issue_date = { May 2012 },
volume = { RTMC },
number = { 10 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 16-20 },
numpages = 5,
url = { /proceedings/rtmc/number10/6693-1081/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%A Sunesh
%A Harish Kumar
%T Watermark Attacks And Applications in Watermarking
%J National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%@ 0975-8887
%V RTMC
%N 10
%P 16-20
%D 2012
%I International Journal of Computer Applications
Abstract

digital watermarking of multimedia content has become a very active research area over the last several years. Digital watermarking is the process of embedding watermark into a digital signal. A digital watermark is a digital signal or pattern inserted into a digital document and carries information unique to the copyright owner, the creator of the document or the authorized consumer. This paper presents various watermark attack. Watermark attack is any processing (ability of unauthorized users) that may remove, detect and estimate, write or modify the raw watermarking bits (watermark). In this paper, we review watermarking applications areas such as ownership assertion, copy control, finger printing etc.

References
  1. . Ton kalker "Considerations on watermarking Security" ; http://wireless. per. nl/watermarks/research/papers/documents/WIA_Invited_Kalker_Philips_SPIE. pdf
  2. . Dilip Kumar Sharma, Vinay Kumar Pathak and G. P. Sahu " Digital watermarking for secure E-Government framework" ; Computer Society Of India;pp182-191.
  3. . http://www. ee. sunysb. edu/~cvl/ese558/s2005/Reports/Abhishek%20Goswami/WatermarksByAbhishekGoswami. pdf
  4. . http://isis. poly. edu/~qiming/publications/mcam07-springer. pdf
  5. . http://www. infosyssec. com/infosyssec/Steganography/watermarkingAttack. htm
  6. . Collberg C. , and Thomborson C. , (2002). Watermarking, Tamper-proofing and Obfuscation- Tools for Software Protection. IEEE Transactions on Software Engineering, Vol. 28, No. 8, pp 735-746.
  7. . http://www. cs. uga. edu/~sadiq/pdf/Watermarking%20%20Basics,%20Types%20and%20Attack%20Resistance%20%20Report. pdf
  8. J. Du, C. H. L and H. -K. Lee Y. Suh "BSS: A new approach to watermark attack";Proceedings of the IEEE Fourth International Symposium on Multimedia Software Engineering (MSE'02).
Index Terms

Computer Science
Information Sciences

Keywords

Digital Watermarking Digital Watermark Watermark Attack .