Loading...
New Generation of On-purpose Attacks for Evaluating Digital Image Watermarking Methods by Preserving the Image Quality
Taherinia, Amir Hossein | 2012
1714
Viewed
- Type of Document: Ph.D. Dissertation
- Language: Farsi
- Document No: 42980 (19)
- University: Sharif University of Technology
- Department: Computer Engineering
- Advisor(s): Jamzad, Mansour
- Abstract:
- Up to now, compared with the comprehensive research for developing robust watermarking algorithms, no equal attention has been devoted to the proposition of benchmarks tailored to assess the watermark robustness. In addition, almost all the state of the art benchmarks only integrate a number of common image processing operations like geometrical transformations to remove watermarks. However, the quality of the processed image is often too degraded to permit further commercial exploitation. Moreover, to the best of our knowledge, the design of these tools does not take into account the statistical properties of the images and watermarks in the design of attacks. In spite of the significant improvements that have been made recently, one of the major problems in the practical watermarking technology is not considering the real world attackers who definitely design more efficient attacks which are fundamentally different from current benchmarking tools. This could lead to a tremendous difference between the existing benchmarking tools and the real world attacks. By considering, the statistical properties of the images and watermarking methods in this thesis we managed to develop a new generation of watermarking attacks for verifying the security and robustness of watermarking algorithms. According to our experimental results by means of subjective and objective measures, the proposed attacks impair the detection of the hidden watermark (making NC below the practical threshold of 0.5) by imposing the least visual distortion on the watermarked image (PSNR of attacked image is more than 38 dB and SSIM is more than 0.8). It is necessary to note that by introducing new attacks we hope to take a step towards the development of a new class of watermarking systems that can effectively cope with sophisticated attacks rather than attacks known as common image processing operations.
- Keywords:
- Watermarking ; Image Watermarking ; Benchmarking ; Robustness ; Robust Watermarking ; Image Quality
- محتواي پايان نامه
- view
- Ch0 -- First Pages
- 0 TOC
- Ch1 -- Introduction _2_
- Ch2 -- Watermarking _13_
- Ch3 -- Current Benchmarks _15_
- Ch4 -- Proposal Structure _9_
- Ch5 -- CAIR _15_
- Ch6 -- Restoration (14)
- Ch7 -- Wavelet (20)
- 7 فصل هفتم: بررسي الگوریتمهای نشانهگذاري در دامنه موجك و ارائه حملهی جدید مبتنی بر این دامنه
- 7-1 مقدمه
- 7-2 تبديل موجك و ويژگيهاي آن
- 7-3 دستهبندی روشهای نشانهگذاری تصاویر در دامنه موجک
- 7-4 روش پيشنهادي براي مخدوش کردن نشانه در دامنهي تبديل موجك
- 7-5 تعیین حدود آستانه برای تعیین بلوکهای نرم و زبر
- 7-6 نتایج عملی
- 7-7 نتایج عملی بر روی 500 تصویر استاندارد
- 7-8 ارزيابي کیفي21F
- 7-9 جمع بندی و نتیجه گیری
- 7 فصل هفتم: بررسي الگوریتمهای نشانهگذاري در دامنه موجك و ارائه حملهی جدید مبتنی بر این دامنه
- Ch8 -- Inpainting (13)
- Ch9 -- Future Works _10_
- Watermarking Methods (Xie,Seg-DCT,GA-Dugad) -- Appendix
- Ch99 Ref
- zGlossary
- zAbstract_EN& Title