Share Email Print
cover

Proceedings Paper

Generalized watermarking attack based on watermark estimation and perceptual remodulation
Author(s): Sviatoslav V. Voloshynovskiy; Shelby Pereira; Alexander Herrigel; Nazanin Baumgartner; Thierry Pun
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Digital image watermarking has become a popular technique for authentication and copyright protection. For verifying the security and robustness of watermarking algorithms, specific attacks have to be applied to test them. In contrast to the known Stirmark attack, which degrades the quality of the image while destroying the watermark, this paper presents a new approach which is based on the estimation of a watermark and the exploitation of the properties of Human Visual System (HVS). The new attack satisfies two important requirements. First, image quality after the attack as perceived by the HVS is not worse than the quality of the stego image. Secondly, the attack uses all available prior information about the watermark and cover image statistics to perform the best watermark removal or damage. The proposed attack is based on a stochastic formulation of the watermark removal problem, considering the embedded watermark as additive noise with some probability distribution. The attack scheme consists of two main stages: (1) watermark estimation and partial removal by a filtering based on a Maximum a Posteriori (MAP) approach; (2) watermark alteration and hiding through addition of noise to the filtered image, taking into account the statistics of the embedded watermark and exploiting HVS characteristics. Experiments on a number of real world and computer generated images show the high efficiency of the proposed attack against known academic and commercial methods: the watermark is completely destroyed in all tested images without altering the image quality. The approach can be used against watermark embedding schemes that operate either in coordinate domain, or transform domains like Fourier, DCT or wavelet.

Paper Details

Date Published: 9 May 2000
PDF: 13 pages
Proc. SPIE 3971, Security and Watermarking of Multimedia Contents II, (9 May 2000); doi: 10.1117/12.384990
Show Author Affiliations
Sviatoslav V. Voloshynovskiy, Univ. of Geneva and Digital Copyright Technologies (Switzerland)
Shelby Pereira, Univ. of Geneva (Switzerland)
Alexander Herrigel, Digital Copyright Technologies (Germany)
Nazanin Baumgartner, Digital Copyright Technologies (Switzerland)
Thierry Pun, Univ. of Geneva (Switzerland)


Published in SPIE Proceedings Vol. 3971:
Security and Watermarking of Multimedia Contents II
Ping Wah Wong; Edward J. Delp, Editor(s)

© SPIE. Terms of Use
Back to Top