Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 1

TDW3431 Digital Watermarking Trimester 1, 2014/2015

Tutorial 7
(Lecture 7)

1. Discuss the importance of restricting watermark operations.

2. Differentiate private watermarking from public watermarking.

3. Briefly describe the assumptions to be made about the capabilities of the adversary when judging the
security of a watermark.

4. How do cryptographic techniques help in solving the problem of unauthorized decoding?

5. The encryption and watermarking layers can be viewed as analogous to two layers of a networking
system: message and transport layers. Illustrate the two-layered watermarking system, and identify
the major responsibility of message and transport layers.

6. Discuss the major advantages of adopting cryptographic tools in a two-layered watermarking system.

7. What is the limitation of appending the entire cover work to the embedded message before computing
a cryptographic signature? Suggest a method that can be used to solve with the limitation.

8. Figure 1 shows the steps of embedding a watermark message along with a cryptographic signature
computed through a one-way hash of the watermark message concatenated with the description of
the cover work. Explain the corresponding watermark detection and watermark validation processes
using a diagram.

Figure 1: A method of linking watermarks to their cover works.

You might also like