Invertibility attack against watermarking based on forged algorithm and a countermeasure

  • Zhang X
  • Wang S
  • 1


    Mendeley users who have this article in their library.
  • 2


    Citations of this article.


It is shown in this paper that, even with a non-invertible watermarking algorithm or an asymmetric watermarking protocol, it is still possible to effect an invertibility attack, which relies on a forged watermarking algorithm, a counterfeit mark, and a fake key. Two examples are given to show the vulnerability of the unfortified non-invertible algorithm/asymmetric protocol. As a solution, a secure watermarking protocol is proposed, which establishes correlation between the watermarking algorithm and the embedded mark. © 2004 Elsevier B.V. All rights reserved.

Author-supplied keywords

  • Digital watermarking
  • Invertibility attack
  • Protocol

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document


  • Xinpeng Zhang

  • Shuozhong Wang

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free