DocumentCode :
3010024
Title :
State-of-the-art digital watermarking attacks
Author :
Khalifa, Othman O. ; Yusof, Yusnita Binti ; Abdalla, Aisha-Hassan ; Olanrewaju, R.F.
Author_Institution :
Electr. & Comput. Eng., Int. Islamic Univ. Malaysia, Kuala Lumpur, Malaysia
fYear :
2012
fDate :
3-5 July 2012
Firstpage :
744
Lastpage :
750
Abstract :
Digital watermarking is a huge research area which is progressively growing. It covers theoretical studies, novel techniques, attacks and performance analysis. An embedded watermark may unintentionally or inadvertently be impaired by such processing. Other types of processing may be applied with the explicit goal of hindering watermark reception. In watermarking terminology, an “attack” is any processing that may impair detection of the watermark or communication of the information conveyed by the watermark. Broadly it can be classified as Intentional Attacks and Non-Intentional Attacks. The processed watermarked data is then called “attacked data”. An important aspect of any Watermarking scheme is its robustness against attacks. The notion of robustness is intuitively clear: A watermark is robust if it cannot be impaired without also rendering the attacked data useless. Watermark impairment can be measured by criteria such as miss probability, probability of bit error, or channel capacity. For multimedia, the usefulness of the attacked data can be gauged by considering its perceptual quality or distortion. Hence, robustness can be evaluated by simultaneously considering watermark impairment and the distortion of the attacked data. An attack succeeds in defeating a watermarking scheme if it impairs the watermark beyond acceptable limits while maintaining the perceptual quality of the attacked data. In this paper, JPEG compression (quality 50 and 75), noise (Gaussian noise), distortion (blurring) and contrast enhancement (histogram equalization and intensity adjustment) are testified. Results shown that embedding gain and DWT decomposition subbands were among the contribute against attacks performed.
Keywords :
Gaussian noise; data compression; discrete wavelet transforms; image watermarking; DWT decomposition subbands; Gaussian noise; JPEG compression; attacked data; bit error probability; channel capacity; contrast enhancement; digital watermarking attack scheme; discrete wavelet transform; distortion; embedded watermark; histogram equalization; intensity adjustment; intentional attacks; miss probability; nonintentional attacks; watermark impairment; Histograms; Image coding; Mathematical model; Noise; Robustness; Transform coding; Watermarking; Attacks; JPEG Compression; com Watermarking;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer and Communication Engineering (ICCCE), 2012 International Conference on
Conference_Location :
Kuala Lumpur
Print_ISBN :
978-1-4673-0478-8
Type :
conf
DOI :
10.1109/ICCCE.2012.6271316
Filename :
6271316
Link To Document :
بازگشت