Destroy the Robust Commercial Watermark via Deep Convolutional Encoder-Decoder Network

被引:0
作者
Jia, Wei [1 ]
Zhu, Zhiying [2 ]
Wang, Huaqi [3 ]
机构
[1] ShanghaiTech Univ, Sch Informat Sci & Technol, Shanghai 201210, Peoples R China
[2] Fudan Univ, Sch Comp Sci, Shanghai 200433, Peoples R China
[3] Shanghai Univ, Sch Commun & Informat Engn, Shanghai 200444, Peoples R China
关键词
MODULATION;
D O I
10.1155/2021/9119478
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, robust watermark is widely used to protect the copyright of multimedia. Robustness is the most important ability for watermark in application. Since the watermark attacking algorithm is a good way to promote the development of robust watermark, we proposed a new method focused on destroying the commercial watermark. At first, decorrelation and desynchronization are used as the preprocessing method. Considering that the train set of thousands of watermarked images is hard to get, we further use the Bernoulli sampling and dropout in network to achieve the training instance extension. The experiments show that the proposed network can effectively remove the commercial watermark. Meanwhile, the processed image can result in good quality that is almost as good as the original image.
引用
收藏
页数:11
相关论文
共 26 条
  • [1] Low-Complexity Single-Image Super-Resolution based on Nonnegative Neighbor Embedding
    Bevilacqua, Marco
    Roumy, Aline
    Guillemot, Christine
    Morel, Marie-Line Alberi
    [J]. PROCEEDINGS OF THE BRITISH MACHINE VISION CONFERENCE 2012, 2012,
  • [2] Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    Chen, B
    Wornell, GW
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) : 1423 - 1443
  • [3] Coltuc D., 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348), P236, DOI 10.1109/ICIP.1999.822891
  • [4] Some general methods for tampering with watermarks
    Cox, IJ
    Linnartz, JPMG
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) : 587 - 593
  • [5] Can invisible watermarks resolve rightful ownerships?
    Craver, S
    Memon, N
    Yeo, BL
    Yeung, M
    [J]. STORAGE AND RETRIEVAL FOR IMAGE AND VIDEO DATABASES V, 1997, 3022 : 310 - 321
  • [6] Stochastic image warping for improved watermark desynchronization
    D'Angelo A.
    Barni M.
    Merhav N.
    [J]. EURASIP Journal on Information Security, 2008 (1):
  • [7] DAngelo A., 2009, THESIS
  • [8] Countermeasures for unintentional and intentional video watermaking attacks
    Deguillaume, F
    Csurka, G
    Pun, T
    [J]. SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 : 346 - 357
  • [9] Dixon R.C., 1994, SPREAD SPECTRUM SYST
  • [10] Real-time attacks on robust watermarking tools in the wild by CNN
    Geng, Linfeng
    Zhang, Weiming
    Chen, Haozhe
    Fang, Han
    Yu, Nenghai
    [J]. JOURNAL OF REAL-TIME IMAGE PROCESSING, 2020, 17 (03) : 631 - 641