{"title":"Robustness Attacks on Video Watermarking Using Singular Value Decomposition","authors":"G. C. Ting, B. Goi, S. Lee","doi":"10.1145/3316551.3316555","DOIUrl":null,"url":null,"abstract":"In the current digital age, where people are commonly connected within the Internet of Things (IoT) and Internet of People (IoP) environments, videos are easily shared on social media and mobile messaging Apps, so there is a need to determine the ownership of these videos so that they are not illegally distributed without acknowledging the source. Robust video watermarking schemes are commonly applied to solve these copyright ownership problems. These types of robust schemes need to withstand modification attacks attempted on the watermark embedded within the videos. In this paper, we focus on two recent watermarking schemes and analyse their robustness. We present attacks that enable malicious buyers to modify the watermarks embedded by the owner.","PeriodicalId":300199,"journal":{"name":"Proceedings of the 2019 3rd International Conference on Digital Signal Processing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2019 3rd International Conference on Digital Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3316551.3316555","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
In the current digital age, where people are commonly connected within the Internet of Things (IoT) and Internet of People (IoP) environments, videos are easily shared on social media and mobile messaging Apps, so there is a need to determine the ownership of these videos so that they are not illegally distributed without acknowledging the source. Robust video watermarking schemes are commonly applied to solve these copyright ownership problems. These types of robust schemes need to withstand modification attacks attempted on the watermark embedded within the videos. In this paper, we focus on two recent watermarking schemes and analyse their robustness. We present attacks that enable malicious buyers to modify the watermarks embedded by the owner.