On the Effectiveness of Visible Watermarks

被引:33
作者
Dekel, Tali [1 ]
Rubinstein, Michael [1 ]
Liu, Ce [1 ]
Freeman, William T. [1 ]
机构
[1] Google Res, Mountain View, CA 94043 USA
来源
30TH IEEE CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2017) | 2017年
关键词
D O I
10.1109/CVPR.2017.726
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Visible watermarking is a widely-used technique for marking and protecting copyrights of many millions of images on the web, yet it suffers from an inherent security flaw-watermarks are typically added in a consistent manner to many images. We show that this consistency allows to automatically estimate the watermark and recover the original images with high accuracy. Specifically, we present a generalized multi-image matting algorithm that takes a watermarked image collection as input and automatically estimates the "foreground" (watermark), its alpha matte, and the "background" (original) images. Since such an attack relies on the consistency of watermarks across image collections, we explore and evaluate how it is affected by various types of inconsistencies in the watermark embedding that could potentially be used to make watermarking more secure. We demonstrate the algorithm on stock imagery available on the web, and provide extensive quantitative analysis on synthetic watermarked data. A key takeaway message of this paper is that visible watermarks should be designed to not only be robust against removal from a single image, but to be more resistant to mass-scale removal from image collections as well.
引用
收藏
页码:6864 / 6872
页数:9
相关论文
共 21 条
[1]   SCAPE: Shape Completion and Animation of People [J].
Anguelov, D ;
Srinivasan, P ;
Koller, D ;
Thrun, S ;
Rodgers, J ;
Davis, J .
ACM TRANSACTIONS ON GRAPHICS, 2005, 24 (03) :408-416
[2]  
[Anonymous], 2009, Ph.D. dissertation
[3]   Image inpainting [J].
Bertalmio, M ;
Sapiro, G ;
Caselles, V ;
Ballester, C .
SIGGRAPH 2000 CONFERENCE PROCEEDINGS, 2000, :417-424
[4]   Protecting publicly-available images with a visible image watermark [J].
Braudaway, GW ;
Magerlein, KA ;
Mintzer, F .
OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES, 1996, 2659 :126-133
[6]  
Dashti M., 2015, AISP
[7]   Wavelet domain adaptive visible watermarking [J].
Hu, YJ ;
Kwong, S .
ELECTRONICS LETTERS, 2001, 37 (20) :1219-1220
[8]   Attacking visible watermarking schemes [J].
Huang, CH ;
Wu, JL .
IEEE TRANSACTIONS ON MULTIMEDIA, 2004, 6 (01) :16-30
[9]  
Kankanhalli MS, 1999, IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS, PROCEEDINGS VOL 1, P568, DOI 10.1109/MMCS.1999.779263
[10]   A closed-form solution to natural image matting [J].
Levin, Anat ;
Lischinski, Dani ;
Weiss, Yair .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2008, 30 (02) :228-242