CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Watermark Attacks And Applications in Watermarking

Published on May 2012 by Sunesh, Harish Kumar
National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
Foundation of Computer Science USA
RTMC - Number 10
May 2012
Authors: Sunesh, Harish Kumar
d611de6f-4b95-47c5-9c5c-847783a74d68

Sunesh, Harish Kumar . Watermark Attacks And Applications in Watermarking. National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011. RTMC, 10 (May 2012), 16-20.

@article{
author = { Sunesh, Harish Kumar },
title = { Watermark Attacks And Applications in Watermarking },
journal = { National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011 },
issue_date = { May 2012 },
volume = { RTMC },
number = { 10 },
month = { May },
year = { 2012 },
issn = 0975-8887,
pages = { 16-20 },
numpages = 5,
url = { /proceedings/rtmc/number10/6693-1081/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%A Sunesh
%A Harish Kumar
%T Watermark Attacks And Applications in Watermarking
%J National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011
%@ 0975-8887
%V RTMC
%N 10
%P 16-20
%D 2012
%I International Journal of Computer Applications
Abstract

digital watermarking of multimedia content has become a very active research area over the last several years. Digital watermarking is the process of embedding watermark into a digital signal. A digital watermark is a digital signal or pattern inserted into a digital document and carries information unique to the copyright owner, the creator of the document or the authorized consumer. This paper presents various watermark attack. Watermark attack is any processing (ability of unauthorized users) that may remove, detect and estimate, write or modify the raw watermarking bits (watermark). In this paper, we review watermarking applications areas such as ownership assertion, copy control, finger printing etc.

References
  1. . Ton kalker "Considerations on watermarking Security" ; http://wireless. per. nl/watermarks/research/papers/documents/WIA_Invited_Kalker_Philips_SPIE. pdf
  2. . Dilip Kumar Sharma, Vinay Kumar Pathak and G. P. Sahu " Digital watermarking for secure E-Government framework" ; Computer Society Of India;pp182-191.
  3. . http://www. ee. sunysb. edu/~cvl/ese558/s2005/Reports/Abhishek%20Goswami/WatermarksByAbhishekGoswami. pdf
  4. . http://isis. poly. edu/~qiming/publications/mcam07-springer. pdf
  5. . http://www. infosyssec. com/infosyssec/Steganography/watermarkingAttack. htm
  6. . Collberg C. , and Thomborson C. , (2002). Watermarking, Tamper-proofing and Obfuscation- Tools for Software Protection. IEEE Transactions on Software Engineering, Vol. 28, No. 8, pp 735-746.
  7. . http://www. cs. uga. edu/~sadiq/pdf/Watermarking%20%20Basics,%20Types%20and%20Attack%20Resistance%20%20Report. pdf
  8. J. Du, C. H. L and H. -K. Lee Y. Suh "BSS: A new approach to watermark attack";Proceedings of the IEEE Fourth International Symposium on Multimedia Software Engineering (MSE'02).
Index Terms

Computer Science
Information Sciences

Keywords

Digital Watermarking Digital Watermark Watermark Attack .