Share Email Print
cover

Proceedings Paper

Review on attacks, problems, and weaknesses of digital watermarking and the pixel reallocation attack
Author(s): K. F. Tsang; Oscar Chi Lim Au
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Watermark attacks are first categorized and explained with examples in this paper. We then propose a new image watermark attack called 'Pixel Reallocation Attack'. The proposed attack is a hybrid approach, which aims to decorrelate the embedded watermark with the original watermark. Since many watermarking detections are by correlating the testing image with the target watermark, it will not work once we decorrelate the embedded watermark. For example, the geometrical transformation attacks desynchronize the correlation detector with the testing image leading to detection failure. However, by inserting a template or grid into the watermarked image can make inverse transformation possible and the watermark can be retrieved. If we apply transformations to every single pixel locally, independently and randomly, inverse transformation will not be possible and the attack will be successful since the embedded watermark is not correlated with the original watermark. Experiment shows that single technique approach needs a larger distortion to the image in order to attack the image successfully. We also tested our attack with commercial watermarking software. It cannot detect the watermark after we applied the proposed hybrid attack to the watermarked image.

Paper Details

Date Published: 1 August 2001
PDF: 9 pages
Proc. SPIE 4314, Security and Watermarking of Multimedia Contents III, (1 August 2001); doi: 10.1117/12.435422
Show Author Affiliations
K. F. Tsang, Hong Kong Univ. of Science and Technology (Hong Kong)
Oscar Chi Lim Au, Hong Kong Univ. of Science and Technology (Hong Kong)


Published in SPIE Proceedings Vol. 4314:
Security and Watermarking of Multimedia Contents III
Ping Wah Wong; Edward J. Delp, Editor(s)

© SPIE. Terms of Use
Back to Top