Professional Documents
Culture Documents
Tutorial 7 (Lecture 7) : TDW3431 Digital Watermarking Trimester 1, 2014/2015
Tutorial 7 (Lecture 7) : TDW3431 Digital Watermarking Trimester 1, 2014/2015
Tutorial 7
(Lecture 7)
3. Briefly describe the assumptions to be made about the capabilities of the adversary when judging the
security of a watermark.
5. The encryption and watermarking layers can be viewed as analogous to two layers of a networking
system: message and transport layers. Illustrate the two-layered watermarking system, and identify
the major responsibility of message and transport layers.
6. Discuss the major advantages of adopting cryptographic tools in a two-layered watermarking system.
7. What is the limitation of appending the entire cover work to the embedded message before computing
a cryptographic signature? Suggest a method that can be used to solve with the limitation.
8. Figure 1 shows the steps of embedding a watermark message along with a cryptographic signature
computed through a one-way hash of the watermark message concatenated with the description of
the cover work. Explain the corresponding watermark detection and watermark validation processes
using a diagram.