Attacking visible watermarking schemes

被引:71
作者
Huang, CH [1 ]
Wu, JL [1 ]
机构
[1] Natl Taiwan Univ, Dept Comp Sci & Informat Engn, Commun & Multimedia Lab, Taipei 106, Taiwan
关键词
attacks; image inpainting; image recovery; visible watermarking;
D O I
10.1109/TMM.2003.819579
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Visible watermarking schemes are important intellectual property rights (IPR) protection mechanisms for digital images and videos that have to be released for certain purposes but illegal reproductions of them are prohibited. Visible watermarking techniques protect digital contents in a more active manner, which is quite different from the invisible watermarking techniques. Digital data embedded with visible watermarks will contain recognizable but unobtrusive copyright patterns, and the details of the host data should still exist. The embedded pattern of a useful visible watermarking scheme should be difficult or even impossible to be removed unless intensive and expensive human labors are involved. In this paper, we propose an attacking scheme against current visible image watermarking techniques. After manually selecting the watermarked areas, only few human interventions are required. For watermarks purely composed of thin patterns, basic image recovery techniques can completely remove the embedded patterns. For more general watermarks consisting of thick patterns, not only information in surrounding unmarked areas but also information within watermarked areas will be utilized to correctly recover the host image. Although the proposed scheme does not guarantee that the recovered images will be exactly identical to the unmarked originals, the structure of the embedded pattern will be seriously destroyed and a perceptually satisfying recovered image can be obtained. In other words, a general attacking scheme based on the contradictive requirements of current visible watermarking techniques is worked out. Thus, the robustness of current visible watermarking schemes for digital images is doubtful and needs to be improved.
引用
收藏
页码:16 / 30
页数:15
相关论文
共 14 条
[1]  
Bertalmio M., 2000, SIGGRAPH 2000 AUG
[2]   Protecting publicly-available images with a visible image watermark [J].
Braudaway, GW ;
Magerlein, KA ;
Mintzer, F .
OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES, 1996, 2659 :126-133
[3]  
CHEN PM, WCCC ICSP 2000
[4]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[5]  
Haralick R. M., 1992, COMPUTER ROBOT VISIO
[6]   Hidden digital watermarks in images [J].
Hsu, CT ;
Wu, JL .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1999, 8 (01) :58-68
[7]  
HU Y, 2001, ELECT LETT, V37
[8]  
JUDD DB, 1975, COLORS BUSINESS SCI
[9]  
KANKANHALLI MS, 1999, IEEE INT C MULT COMP
[10]  
KOKARAM AC, 1995, IEEE T IMAGE PROCESS, V11