Apparatus and methods for attacking a screening algorithm. Content is transformed within a first transformation device, then subjected to a screening algorithm, and finally transformed within a second transformation device. A watermark within the content is manipulated within the first transformation device by, for example, adding a pseudo-random sequence. The second transformation device removes the pseudo-random sequence or otherwise reverses the manipulation performed on the content after the content has been admitted into the secure domain.
展开▼