Digital Video Watermarking and the Collusion Attack

Digital Video Watermarking and the Collusion Attack

Robert Caldelli (University of Florence, Italy) and Alessandro Piva (University of Florence, Italy)
Copyright: © 2009 |Pages: 17
DOI: 10.4018/978-1-59904-869-7.ch004
OnDemand PDF Download:


This chapter is devoted to the analysis of the collusion attack applied to current digital video watermarking algorithms. In particular, we analyze the effects of collusion attacks, with particular attention to the temporal frame averaging (TFA), applied to two basic watermarking systems like spread spectrum (SS) and spread transform dither modulation (STDM). The chapter describes the main drawbacks and advantages in using these two watermarking schemes and, above all, the fundamental issues to be taken into account to grant a certain level of robustness when a collusion attack is carried out by an attacker.

Complete Chapter List

Search this Book:
List of Reviewers
Table of Contents
Anthony T.S. Ho
Chang-Tsun Li
Chapter 1
Hae Yong Kim, Sergio Vicente Denser Pamboukian, Paulo Sérgio Licciardi Messeder Barreto
Data hiding (DH) is a technique used to embed a sequence of bits in a cover image with small visual deterioration and the means to extract it... Sample PDF
Authentication Watermarkings for Binary Images
Chapter 2
Shiguo Lian
Since the past decade, multimedia protection technologies have been attracting more and more researchers. Among them, multimedia encryption and... Sample PDF
Secure Multimedia Content Distribution Based on Watermarking Technology
Chapter 3
Maria Calagna
The chapter illustrates watermarking based on the transform domain. It argues that transform-based watermarking is robust to possible attacks and... Sample PDF
Digital Watermarking in the Transform Domain with Emphasis on SVD
Chapter 4
Robert Caldelli, Alessandro Piva
This chapter is devoted to the analysis of the collusion attack applied to current digital video watermarking algorithms. In particular, we analyze... Sample PDF
Digital Video Watermarking and the Collusion Attack
Chapter 5
Nataša Terzija
The resistance of watermarking schemes against geometric distortions has been the subject of much research and development effort in the last 10... Sample PDF
A Survey of Current Watermarking Synchronization Techniques
Chapter 6
Martin Steinebach, Patrick Wolf
Digital watermarking promises to be a mechanism for copyright protection without being a technology for copy prevention. This sometimes makes it... Sample PDF
On the Necessity of Finding Content Before Watermark Retrieval: Active Search Strategies for Localising Watermarked Media on the Internet
Chapter 7
Fouad Khelifi, Fatih Kurugollu, Ahmed Bouridane
The problem of multiplicative watermark detection in digital images can be viewed as a binary decision where the observation is the possibility that... Sample PDF
Statistical Watermark Detection in the Transform Domain for Digital Images
Chapter 8
Christopher B. Smith, Sos S. Agaian
Modern digital steganography has evolved a number of techniques to embed information near invisibly into digital media. Many of the techniques for... Sample PDF
On Noise, Steganography, and the Active Warden
Chapter 9
Patrick Le Callet, Florent Autrusseau, Patrizio Campisi
In watermarking and data hiding context, it may be very useful to have methods checking the invisibility of the inserted data or at least, checking... Sample PDF
Visibility Control and Quality Assessment of Watermarking and Data Hiding Algorithms
Chapter 10
Maciej Liskiewicz, Ulrich Wölfel
This chapter provides an overview, based on current research, on theoretical aspects of digital steganography— a relatively new field of computer... Sample PDF
Computational Aspects of Digital Steganography
Chapter 11
Christopher B. Smith, Sos S. Agaian
Steganalysis is the art and science of detecting hidden information. Modern digital steganography has created techniques to embed information near... Sample PDF
On Steganalysis and Clean Image Estimation
Chapter 12
Hafiz Malik, Rajarathnam Chandramouli, K. P. Subbalakshmi
In this chapter we provide a detailed overview of the state of the art in steganalysis. Performance of some steganalysis techniques are compared... Sample PDF
Steganalysis: Trends and Challenges
Chapter 13
Benchmarking Steganalysis  (pages 266-290)
Andrew D. Ker
This chapter discusses how to evaluate the effectiveness of steganalysis techniques. In the steganalysis literature, numerous different methods are... Sample PDF
Benchmarking Steganalysis
Chapter 14
Matthew James Sorrell
We propose that the implementation of the JPEG compression algorithm represents a manufacturer and model-series specific means of identification of... Sample PDF
Digital Camera Source Identification Through JPEG Quantisation
Chapter 15
Hongxia Jin
This chapter discusses the cryptographic traitor tracing technology that is used to defend against piracy in multimedia content distribution. It... Sample PDF
Traitor Tracing for Multimedia Forensics
Chapter 16
Dominik Engel, Thomas Stütz, Andreas Uhl
In this chapter we investigate two different techniques for transparent/perceptual encryption of JPEG2000 files or bitstreams in the context of... Sample PDF
Efficient Transparent JPEG2000 Encryption
About the Contributors