CAWNet: A Channel Attention Watermarking Attack Network Based on CWABlock

被引:0
作者
Wang, Chunpeng [1 ]
Tian, Pengfei [1 ]
Wei, Ziqi [2 ]
Li, Qi [1 ]
Xia, Zhiqiu [1 ]
Ma, Bin [1 ]
机构
[1] Qilu Univ Technol, Jinan 250353, Peoples R China
[2] Chinese Acad Sci, Inst Automat, Beijing 100190, Peoples R China
来源
PATTERN RECOGNITION AND COMPUTER VISION, PRCV 2023, PT IX | 2024年 / 14433卷
基金
中国国家自然科学基金;
关键词
watermarking attack; deep learning; CWABlock; attention mechanism; Imperceptible; Robustness; COLOR IMAGE; MOMENTS;
D O I
10.1007/978-981-99-8546-3_4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, watermarking technology has been widely used as a common information hiding technique in the fields of copyright protection, authentication, and data privacy protection in digital media. However, the development of watermark attack techniques has lagged behind. Improving the efficiency of watermark attack techniques and effectively attacking watermarks has become an urgent problem to be solved. Therefore, this paper proposes a watermark attack network called CAWNet. Firstly, this paper designs a convolution-based watermark attack module (CWABlock), which introduces channel attention mechanism. By replacing fully connected layers with global average pooling layers, the parameter quantity of the network is reduced and the computational efficiency is improved, enabling effective attacks on watermark information. Secondly, in the training phase, we utilize a largescale real-world image dataset for training and employ data augmentation strategies to enhance the robustness of the network. Finally, we conduct ablation experiments on CWABlock, attention mechanism, and other modules, as well as comparative experiments on different watermark attack methods. The experimental results demonstrate significant improvements in the effectiveness of the proposed watermark attack approach.
引用
收藏
页码:41 / 52
页数:12
相关论文
共 21 条
  • [1] Survey of robust and imperceptible watermarking
    Agarwal, Namita
    Singh, Amit Kumar
    Singh, Pradeep Kumar
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (07) : 8603 - 8633
  • [2] Digital image steganography: Survey and analysis of current methods
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    Mc Kevitt, Paul
    [J]. SIGNAL PROCESSING, 2010, 90 (03) : 727 - 752
  • [3] The PASCAL Visual Object Classes Challenge: A Retrospective
    Everingham, Mark
    Eslami, S. M. Ali
    Van Gool, Luc
    Williams, Christopher K. I.
    Winn, John
    Zisserman, Andrew
    [J]. INTERNATIONAL JOURNAL OF COMPUTER VISION, 2015, 111 (01) : 98 - 136
  • [4] Real-time attacks on robust watermarking tools in the wild by CNN
    Geng, Linfeng
    Zhang, Weiming
    Chen, Haozhe
    Fang, Han
    Yu, Nenghai
    [J]. JOURNAL OF REAL-TIME IMAGE PROCESSING, 2020, 17 (03) : 631 - 641
  • [5] Attention mechanisms in computer vision: A survey
    Guo, Meng-Hao
    Xu, Tian-Xing
    Liu, Jiang-Jiang
    Liu, Zheng-Ning
    Jiang, Peng-Tao
    Mu, Tai-Jiang
    Zhang, Song-Hai
    Martin, Ralph R.
    Cheng, Ming-Ming
    Hu, Shi-Min
    [J]. COMPUTATIONAL VISUAL MEDIA, 2022, 8 (03) : 331 - 368
  • [6] Hatoum M.W., 2021, Image Commun., V90
  • [7] Hu J, 2018, PROC CVPR IEEE, P7132, DOI [10.1109/CVPR.2018.00745, 10.1109/TPAMI.2019.2913372]
  • [8] Jeruchim M. C., 1984, IEEE Journal on Selected Areas in Communications, VSAC-2, P153, DOI 10.1109/JSAC.1984.1146031
  • [9] Robust Digital Watermarking Techniques for Copyright Protection of Digital Data: A Survey
    Kadian, Poonam
    Arora, Shiafali M.
    Arora, Nidhi
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 118 (04) : 3225 - 3249
  • [10] Korhonen J, 2012, INT WORK QUAL MULTIM, P37, DOI 10.1109/QoMEX.2012.6263880