Watermark Attack Based on Blind Estimation Without Priors
نویسندگان
چکیده
With the rapid growth of multimedia application, there has been significantly bared a crucial need for effective copyright protection mechanisms. Therefore, digital image, video, audio and text watermarking has recently become a very active research area of signal and information processing, as a solution to this problem. Many important issues have been pointed out, one of them being the robustness to non-intentional and intentional attacks. In this paper, a new estimation based watermark attack method is presented. The proposed attack regards the watermark system as a black box by assuming watermark signal as different kinds of noise, instead of using the prior knowledge of the watermark signal and embedding methods. To estimate the original image data, blind estimation and a MIMO linear channel are introduced. Experimental results demonstrate the proposed watermark attack method show the high efficiency against known academic and commercial methods. The watermark is completely destroyed in all tested images without altering the image quality.
منابع مشابه
Blind Watermark Estimation Attack for Spread Spectrum Watermarking
This paper presents an efficient scheme for blind watermark estimation embedded using additive watermark embedding methods. The scheme exploits mutual independence between the host media and the embedded watermark and non-Gaussianity of the host media for watermark estimation. The proposed scheme employs the framework of independent component analysis (ICA) and poses the problem of watermark es...
متن کاملGeneralized watermarking attack based on watermark estimation and perceptual remodulation
Digital image watermarking has become a popular technique for authentication and copyright protection. For verifying the security and robustness of watermarking algorithms, specific attacks have to be applied to test them. In contrast to the known Stirmark attack, which degrades the quality of the image while destroying the watermark, this paper presents a new approach which is based on the est...
متن کاملAnalysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack
Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...
متن کاملWatermark Embedding and Extraction using Histogram Shifting and Butterworth Filtering
In the digital image watermarking community, developing a robust watermarking method has withdrawn attention in recent years. In this paper, robust image watermark algorithm is proposed which is based on histogram shape and Butterworth filtering that resist against geometric attack and signal processing attack by using invariance property of histogram to scaling and without exploiting robust fe...
متن کاملInter-frame Collusion Attack in SS-N Video Watermarking System
Video watermarking is usually considered as watermarking of a set of still images. In frame-by-frame watermarking approach, each video frame is seen as a single watermarked image, so collusion attack is more critical in video watermarking. If the same or redundant watermark is used for embedding in every frame of video, the watermark can be estimated and then removed by watermark estimate remod...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2002