摘要 |
<p>Apparatus and methods for attacking a screening algorithm. Content is transformed within a first transformation device (12-1), then subjected to a screening algorithm, and finally transformed within a second transformation device (12-2). A watermark within the content is manipulated within the first transformation device by, for example, adding a pseudo-random sequence. The second transformation device removes the pseudo-random sequence or otherwise reverses the manipulation performed on the content after the content has been admitted into the secure domain.</p> |