Consideration of the watermark inversion attack and its invalidation framework

Kazuo Ohzeki, Yuanyu Wei, Yutaka Hirakawa, Kiyosugu Sato

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

This paper considers the problem of the inversion attack. We discuss a relation of a copyright owner and an attacker on an equal footing, the problem of the assumption of robustness, and the quantization error as a one-way function. Using an improved two-stage watermarking system, a framework that invalidates an inversion attack is proposed.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages98-110
Number of pages13
Volume7809 LNCS
DOIs
Publication statusPublished - 2013
Event11th International Workshop on Digital Forensics and Watermaking, IWDW 2012 - Shanghai
Duration: 2012 Oct 312012 Nov 3

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7809 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other11th International Workshop on Digital Forensics and Watermaking, IWDW 2012
CityShanghai
Period12/10/3112/11/3

Fingerprint

Watermarking

Keywords

  • inversion attack
  • one-way function
  • quantization
  • watermark

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Ohzeki, K., Wei, Y., Hirakawa, Y., & Sato, K. (2013). Consideration of the watermark inversion attack and its invalidation framework. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7809 LNCS, pp. 98-110). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7809 LNCS). https://doi.org/10.1007/978-3-642-40099-5_9

Consideration of the watermark inversion attack and its invalidation framework. / Ohzeki, Kazuo; Wei, Yuanyu; Hirakawa, Yutaka; Sato, Kiyosugu.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7809 LNCS 2013. p. 98-110 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 7809 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ohzeki, K, Wei, Y, Hirakawa, Y & Sato, K 2013, Consideration of the watermark inversion attack and its invalidation framework. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 7809 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 7809 LNCS, pp. 98-110, 11th International Workshop on Digital Forensics and Watermaking, IWDW 2012, Shanghai, 12/10/31. https://doi.org/10.1007/978-3-642-40099-5_9
Ohzeki K, Wei Y, Hirakawa Y, Sato K. Consideration of the watermark inversion attack and its invalidation framework. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7809 LNCS. 2013. p. 98-110. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-40099-5_9
Ohzeki, Kazuo ; Wei, Yuanyu ; Hirakawa, Yutaka ; Sato, Kiyosugu. / Consideration of the watermark inversion attack and its invalidation framework. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7809 LNCS 2013. pp. 98-110 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{0377538043a14293839e4305fc988634,
title = "Consideration of the watermark inversion attack and its invalidation framework",
abstract = "This paper considers the problem of the inversion attack. We discuss a relation of a copyright owner and an attacker on an equal footing, the problem of the assumption of robustness, and the quantization error as a one-way function. Using an improved two-stage watermarking system, a framework that invalidates an inversion attack is proposed.",
keywords = "inversion attack, one-way function, quantization, watermark",
author = "Kazuo Ohzeki and Yuanyu Wei and Yutaka Hirakawa and Kiyosugu Sato",
year = "2013",
doi = "10.1007/978-3-642-40099-5_9",
language = "English",
isbn = "9783642400988",
volume = "7809 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "98--110",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Consideration of the watermark inversion attack and its invalidation framework

AU - Ohzeki, Kazuo

AU - Wei, Yuanyu

AU - Hirakawa, Yutaka

AU - Sato, Kiyosugu

PY - 2013

Y1 - 2013

N2 - This paper considers the problem of the inversion attack. We discuss a relation of a copyright owner and an attacker on an equal footing, the problem of the assumption of robustness, and the quantization error as a one-way function. Using an improved two-stage watermarking system, a framework that invalidates an inversion attack is proposed.

AB - This paper considers the problem of the inversion attack. We discuss a relation of a copyright owner and an attacker on an equal footing, the problem of the assumption of robustness, and the quantization error as a one-way function. Using an improved two-stage watermarking system, a framework that invalidates an inversion attack is proposed.

KW - inversion attack

KW - one-way function

KW - quantization

KW - watermark

UR - http://www.scopus.com/inward/record.url?scp=84883151544&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84883151544&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-40099-5_9

DO - 10.1007/978-3-642-40099-5_9

M3 - Conference contribution

SN - 9783642400988

VL - 7809 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 98

EP - 110

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -