Robustness and Security of Digital Watermarks By: “L.R Matheson, S.G.Mitchell, T.G. Shamoon, R.E.Tarjan, F.Zane” STAR Lab, InterTrust Technologies Corporation.
Robustness and Security of Digital WatermarksBy:“L.R Matheson, S.G.Mitchell, T.G. Shamoon, R.E.Tarjan, F.Zane”STAR Lab, InterTrust Technologies Corporation
“A body of work exists [which is] devoted to answering the question of whether truly secure watermarks can exist, and what the characteristics of such marks might be.”
presented by: Fariba Shadabi
The changes caused
by marking should
not affect the value
of the content.
Watermarks should survive
standard data processing
without violating the
Watermarks should survive any planned attempts to remove them. An Attacker can try standard processing techniques plus other transformaton techniques which are specifically designed to erase watermarks.
Include: Data compression, Data conversion, and others.