Please use this identifier to cite or link to this item: http://hdl.handle.net/1783.1/1957

A review on attacks, problems and weaknesses of digital watermarking and the pixel reallocation attack

Authors Tsang, K. F.
Au, Oscar C.
Issue Date 2001
Source Proceedings of SPIE - The International Society for Optical Engineering , v. 4314, 2001, p. 385-393
Summary Watermark attacks are first categorized and explained with examples in this paper. We then propose a new image watermark attack called "Pixel Reallocation Attack". The proposed attack is a hybrid approach, which aims to decorrelate the embedded watermark with the original watermark. Since many watermarking detections are by correlating the testing image with the target watermark, it will not work once we decorrelate the embedded watermark. For example, the geometrical transformation attacks desynchronize the correlation detector with the testing image leading to detection failure. However, by inserting a template or grid into the watermarked image can make inverse transformation possible and the watermark can be retrieved. If we apply transformations to every single pixel locally, independently and randomly, inverse transformation will not be possible and the attack will be successful since the embedded watermark is not correlated with the original watermark. Experiment shows that single technique approach needs a larger distortion to the image in order to attack the image successfully. We also tested our attack with commercial watermarking software. It cannot detect the watermark after we applied the proposed hybrid attack to the watermarked image.
Subjects
ISSN 0277-786X
ISBN 0-8194-3992-4
Rights Copyright 2001 Society of Photo-Optical Instrumentation Engineers. This paper was published in Security and Watermarking of Multimedia Contents III, Ping Wah Wong, Edward J. Delp III, Editors, Proceedings of SPIE Vol. 4314, p. 385-93 (2001) and is made available as an electronic reprint with permission of SPIE. One print or electronic copy may be made for personal use only. Systematic or multiple reproduction, distribution to multiple locations via electronic or other means, duplication of any material in this paper for a fee or for commercial purposes, or modification of the content of the paper are prohibited.
Language English
Format Conference paper
Access View full-text via DOI
View full-text via Scopus
View full-text via Web of Science
Find@HKUST
Files in this item:
File Description Size Format
43144.pdf 2455756 B Adobe PDF