Analysis of Attacks on Common Watermarking Techniques
نویسنده
چکیده
Watermarking is a technique that is used in copyright–protection for valuable medias. Watermarking is measured by four quantities: capacity, security, robustness, and imperceptibility. In this study, robustness of five watermarking algorithms will be assessed. The study will also lightly touch on imperceptibility characteristics of the algorithms. The five algorithms are CDMA Spatial Domain Spread Spectrum, Comparison-Based Correlation in DCT Midband, CDMA Wavelet Domain Spread Spectrum, Bruyndonckx, and Cox. The latter two algorithms are fingerprinting algorithms, which is a subset of watermarking algorithms with slightly different design goal. Our attacks, based on easy, unintentional image processing revealed that DCT domain algorithms – Comparison-Based Correlation in DCT Midband and Cox, have the best robustness property to JPEG compression, downscaling, median, and mean filters. However, spatial domain techniques such as Bruyndonckx can achieve better PSNR with less visual impact on the image.
منابع مشابه
Increasing the Capacity and PSNR in Blind Watermarking Resist Against Cropping Attacks
Watermarking has increased dramatically in recent years in the Internet and digital media. Watermarking is one of the powerful tools to protect copyright. Local image features have been widely used in watermarking techniques based on feature points. In various papers, the invariance feature has been used to obtain the robustness against attacks. The purpose of this research was based on local f...
متن کاملAnalysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack
Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...
متن کاملTwo Novel Chaos-Based Algorithms for Image and Video Watermarking
In this paper we introduce two innovative image and video watermarking algorithms. The paper’s main emphasis is on the use of chaotic maps to boost the algorithms’ security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding po...
متن کاملDigital Blind Audio Watermarking
Digital audio watermarking techniques are widely applied to protect the ownership of digital audio media. This study presents an audio watermarking scheme for audio e-leaning contents. The proposed audio watermarking method can significantly reduce the bit error rates, so enhance the robustness against common attacks. The experimental results under common attacks demonstrate that our watermarki...
متن کاملProposing an effective approach for Network security and multimedia documents classically using encryption and watermarking
Local binary pattern (LBP) operators, which measure the local contrast within a pixel's neighborhood, successfully applied to texture analysis, visual inspection, and image retrieval. In this paper, we recommend a semi blind and informed watermarking approach. The watermark has been built from the original image using Weber Law. The approach aims is to present a high robustness and imperceptibi...
متن کاملA Modified Digital Image Watermarking Scheme Based on Nonnegative Matrix Factorization
This paper presents a modified digital image watermarking method based on nonnegative matrix factorization. Firstly, host image is factorized to the product of three nonnegative matrices. Then, the centric matrix is transferred to discrete cosine transform domain. Watermark is embedded in low frequency band of this matrix and next, the reverse of the transform is computed. Finally, watermarked ...
متن کامل