DocumentCode :
3547693
Title :
Near-perfect cover image recovery anti-multiple watermark embedding approaches
Author :
Hsu, Chao-Yong ; Lu, Chun-Shien
Author_Institution :
Inst. of Inf. Sci., Acad. Sinica, Taipei, Taiwan
fYear :
2005
fDate :
23-26 May 2005
Firstpage :
5517
Abstract :
Robustness is a critical requirement for a watermarking scheme to be practical. Especially, in order to resist geometric distortions, a common way is to insert multiple-redundant watermarks locally in the hope that partial watermarks could still be detected. However, there exist watermark-estimation attacks (WEA), such as the collusion attack, that can remove watermarks while making the attacked data further transparent to its original. Another kind of attack is the copy attack, which can cause protocol ambiguity within a watermarking system. The paper proposes an efficient cover data recovery attack, which is more powerful than the conventional collusion attack. We begin by gaining insight into the WEA, leading to formal definitions of optimal watermark estimation and near-perfect cover data recovery. Subject to these definitions, an exquisite collusion attack is derived. Experimental results verify the effectiveness of the proposed watermark estimation and recovery algorithm.
Keywords :
data encapsulation; image coding; parameter estimation; watermarking; anti-multiple watermark embedding approaches; copy attack; cover data recovery attack; exquisite collusion attack; multiple-redundant watermarks; near-perfect cover data recovery; near-perfect cover image recovery; optimal watermark estimation; protocol ambiguity; watermark recovery algorithm; watermark-estimation attacks; Chaos; Detectors; Information science; Noise reduction; Protocols; Resists; Robustness; Statistics; Watermarking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Circuits and Systems, 2005. ISCAS 2005. IEEE International Symposium on
Print_ISBN :
0-7803-8834-8
Type :
conf
DOI :
10.1109/ISCAS.2005.1465886
Filename :
1465886
Link To Document :
بازگشت