Robustness and Security of Digital Watermarks By: “L.R Matheson, S.G.Mitchell, T.G. Shamoon, R.E.Tarjan, F.Zane” STAR Lab, InterTrust Technologies Corporation.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Robustness and Security of Digital WatermarksBy:“L.R Matheson, S.G.Mitchell, T.G. Shamoon, R.E.Tarjan, F.Zane”STAR Lab, InterTrust Technologies Corporation
“A body of work exists [which is] devoted to answering the question of whether truly secure watermarks can exist, and what the characteristics of such marks might be.”
presented by: Fariba Shadabi
The changes caused
by marking should
not affect the value
of the content.
Watermarks should survive
standard data processing
without violating the
Watermarks should survive any planned attempts to remove them. An Attacker can try standard processing techniques plus other transformaton techniques which are specifically designed to erase watermarks.
Include: Data compression, Data conversion, and others.