Loading...

A two-step watermarking attack using long-range correlation image restoration

Taherinia, A. H ; Sharif University of Technology | 2012

790 Viewed
  1. Type of Document: Article
  2. DOI: 10.1002/sec.357
  3. Publisher: 2012
  4. Abstract:
  5. This paper presents an efficient scheme for blind watermark attacking using the concept of matching of the long-range data. The main idea of the proposed attack is to add plenty of noise to the watermarked image and then try to restore an unwatermarked copy of the noisy image. The aim is to destroy the watermark information without accessing the parameters used during the watermark embedding process. So, it allows our approach to be completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. Experimental results show the proposed algorithm's superiority over several other traditional watermarking benchmarks such as Stirmark and Optimark. Peak signal-to-noise ratio of the watermarked image after applying the proposed attack is more than 45dB, and the normalized cross-correlation for the extracted watermark is lower than 0·4, so the watermark is not detectable after our attack
  6. Keywords:
  7. Image restoration ; Noise addition watermarking ; Benchmarks ; Blind watermark ; Long range correlations ; Noise addition ; Noisy image ; Normalized cross-correlation ; Peak signal-to-noise ratio ; Stirmark ; Watermark embedding ; Watermark embedding process ; Watermark information ; Watermarked images ; Watermarking algorithms ; Watermarking attack ; Algorithms ; Digital watermarking ; Image reconstruction ; Watermarking
  8. Source: Security and Communication Networks ; Volume 5, Issue 6 , AUG , 2012 , Pages 625-635 ; 19390122 (ISSN)
  9. URL: http://onlinelibrary.wiley.com/doi/10.1002/sec.357/abstract;jsessionid=F9EEB6A19C47A24273F83402F467AC65.f03t01