Loading...

New Generation of On-purpose Attacks for Evaluating Digital Image Watermarking Methods by Preserving the Image Quality

Taherinia, Amir Hossein | 2012

1714 Viewed
  1. Type of Document: Ph.D. Dissertation
  2. Language: Farsi
  3. Document No: 42980 (19)
  4. University: Sharif University of Technology
  5. Department: Computer Engineering
  6. Advisor(s): Jamzad, Mansour
  7. Abstract:
  8. Up to now, compared with the comprehensive research for developing robust watermarking algorithms, no equal attention has been devoted to the proposition of benchmarks tailored to assess the watermark robustness. In addition, almost all the state of the art benchmarks only integrate a number of common image processing operations like geometrical transformations to remove watermarks. However, the quality of the processed image is often too degraded to permit further commercial exploitation. Moreover, to the best of our knowledge, the design of these tools does not take into account the statistical properties of the images and watermarks in the design of attacks. In spite of the significant improvements that have been made recently, one of the major problems in the practical watermarking technology is not considering the real world attackers who definitely design more efficient attacks which are fundamentally different from current benchmarking tools. This could lead to a tremendous difference between the existing benchmarking tools and the real world attacks. By considering, the statistical properties of the images and watermarking methods in this thesis we managed to develop a new generation of watermarking attacks for verifying the security and robustness of watermarking algorithms. According to our experimental results by means of subjective and objective measures, the proposed attacks impair the detection of the hidden watermark (making NC below the practical threshold of 0.5) by imposing the least visual distortion on the watermarked image (PSNR of attacked image is more than 38 dB and SSIM is more than 0.8). It is necessary to note that by introducing new attacks we hope to take a step towards the development of a new class of watermarking systems that can effectively cope with sophisticated attacks rather than attacks known as common image processing operations.
  9. Keywords:
  10. Watermarking ; Image Watermarking ; Benchmarking ; Robustness ; Robust Watermarking ; Image Quality

 Digital Object List

 Bookmark

...see more