Attack Characterization for Effective Watermarking

نویسندگان

  • Deepa Kundur
  • Dimitrios Hatzinakos
چکیده

We present and analyze an approach to improve the performance of a broad class of watermarking schemes through attack characterization. Traditional robust watermarking methods use little information concerning the way in which the image is tampered to estimate the embedded watermark. In our novel scheme we propose adding two types of watermarks: reference and robust. The reference watermark is used to assess the way in which the marked image has been modied so that the robust watermark can be optimally extracted to maximize security. Analysis and simulation results are provided to demonstrate the signi cant performance improvement when the proposed approach is employed in an existing watermarking scheme.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved Digital Watermarking Through Diversity and Attack Characterization

In this work, we propose and evaluate the use of novel communication theory tool-sets to improve the performance of digital watermarking algorithms. The emphasis is on the application of basic channel estimation and communication diversity principles to the problem of robust data hiding in multimedia signals. An analytic framework is presented from which we derive general insights into strategi...

متن کامل

Spread spectrum audio watermarking using frequency hopping and attack characterization

In this paper, we present a novel audio watermarking scheme that uses attack characterization to obtain high robustness against standard watermark attacks. The watermark embedding and detection are based on the frequency hopping method in the spectral domain. Perceptual transparency of the algorithm, achieved using frequency masking property of the human auditory system, was con5rmed throughout...

متن کامل

Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack

Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...

متن کامل

Increasing Robustness of an Improved Spread Spectrum Audio Watermarking Method Using Attack Characterization

We propose a novel robust audio watermarking algorithm in time domain that uses perceptually tuned ISS method and attack characterization at the embedding side. Attack characterization is used for prediction of distortions in the watermark channel in order to improve watermark detection reliability. The proposed algorithm has decreased bit error rate in comparison with the watermarking system t...

متن کامل

Best Security Index for Digital Fingerprinting

Digital watermarking used for fingerprinting may receive a collusion attack; two or more users collude, compare their data, find a part of embedded watermarks, and make an unauthorized copy by masking their identities. In this paper, assuming that at most c users collude, we give a characterization of the fingerprinting codes that have the best security index in a sense of “(c, p/q)-secureness”...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999