Attack Algorithm on Watermarking with Public Watermark Detection

被引:0
|
作者
Hu, Yanjun [1 ]
Yang, Lei [1 ]
Cao, Xinde [1 ]
Wang, Guanjun [1 ]
机构
[1] China Univ Min & Technol, Sch Informat & Elect Engn, Xuzhou 221008, Jiangsu, Peoples R China
来源
NANOTECHNOLOGY AND COMPUTER ENGINEERING | 2010年 / 121-122卷
关键词
Attack algorithm; independent component analysis; digital image watermarking;
D O I
10.4028/www.scientific.net/AMR.121-122.423
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper proposes an attack algorithm for digital image watermarking based on independent component analysis (ICA). The paper gives a briefly introduction about ICA algorithm, and expatiates on the attack algorithm which we proposed. The algorithm uses an auxiliary image to remove the watermark signal from the host image based on blind signal separation technology. The paper also does some experiment to attack the watermark algorithm proposed by I J. Cox. The results show that this attack algorithm not only removes most of the digital watermark information, but also has little effect on the image's peak signal to noise ratio. The paper also discusses the attack algorithm for different watermark signals and different auxiliary images; the effect of this attack algorithm is feasible.
引用
收藏
页码:423 / 428
页数:6
相关论文
共 50 条
  • [1] Blind Watermark Estimation Attack for Spread Spectrum Watermarking
    Malik, Hafiz
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (01): : 49 - 68
  • [2] Fragile Watermark Algorithm for Multipurpose Image Watermarking
    Zhang, Jindan
    Wu, Guangming
    2012 2ND INTERNATIONAL CONFERENCE ON APPLIED ROBOTICS FOR THE POWER INDUSTRY (CARPI), 2012, : 404 - 407
  • [3] Robust Watermark Algorithm For Multipurpose Image Watermarking
    Zhang, Jindan
    Ding, Yi
    2012 2ND INTERNATIONAL CONFERENCE ON APPLIED ROBOTICS FOR THE POWER INDUSTRY (CARPI), 2012, : 356 - 359
  • [4] SPY-WATERMARK: ROBUST INVISIBLE WATERMARKING FOR BACKDOOR ATTACK
    Wang, Ruofei
    Wan, Renjie
    Guo, Zongyu
    Guo, Qing
    Huang, Rui
    2024 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING, ICASSP 2024, 2024, : 2700 - 2704
  • [5] A Similarity Attack to Correlation-based Public Watermarking Detection
    Yao, Xiaoming
    Du, Wencai
    Fu, Jundong
    THIRD INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING (MUE 2009), 2009, : 168 - +
  • [6] Generalized watermarking attack based on watermark estimation and perceptual remodulation
    Voloshynovskiy, S
    Pereira, S
    Herrigel, A
    Baumgartner, N
    Pun, T
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 : 358 - 370
  • [7] Adaptive blind watermarking algorithm to embed readable watermark
    Zhang, Guan-Nan
    Wang, Shu-Xun
    Wen, Quan
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2005, 33 (02): : 308 - 312
  • [8] A NOVEL TEXT WATERMARKING ALGORITHM USING IMAGE WATERMARK
    Jalil, Zunera
    Jaffar, M. Arfan
    Mirza, Anwar M.
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2011, 7 (03): : 1255 - 1271
  • [9] An Invisible Text Watermarking Algorithm using Image Watermark
    Jalil, Zunera
    Mirza, Anwar M.
    INNOVATIONS IN COMPUTING SCIENCES AND SOFTWARE ENGINEERING, 2010, : 147 - 152
  • [10] LMS-based attack on watermark public detectors
    Mansour, MF
    Tewfik, AH
    2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL III, PROCEEDINGS, 2002, : 649 - 652