BSS: A New Approach for Watermark Attack

نویسندگان

  • Jiang Du
  • Choong-Hoon Lee
  • Heung-Kyu Lee
  • Young-Ho Suh
چکیده

Digital watermarking is the enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multimedia data, and analyze the spread spectrum of the data over networks and servers. Most watermarking methods for images and video can be viewed as a communications problem in which the watermark must be transmitted and received through a watermark channel. This channel includes distortions resulting from attacks and interference from the original digital data [1]. It is well accepted that an effective watermarking scheme may be described as the secure, imperceptible, robust communication of information by direct embedding in and retrieval from digital data. For verifying the security and robustness of watermarking algorithms, specific attacks have to be applied to test them. In this paper, using a theoretical approach based on random processes, signal processes, and communication theory, we propose a stochastic formulation of a new watermarking attack using blind source separation-based concept. The proposed attack consider the watermarking channel as a “black-box”. A host image was passed through the “black-box”, which include the watermarking embedding process, and then the watermarked image was produced. The watermarked image is viewed as linear mixtures of unknown source signals, and then we attempt to recover sources from their linear mixtures without resorting to any prior knowledge by using blind source separation theory.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack

Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...

متن کامل

Generalized watermarking attack based on watermark estimation and perceptual remodulation

Digital image watermarking has become a popular technique for authentication and copyright protection. For verifying the security and robustness of watermarking algorithms, specific attacks have to be applied to test them. In contrast to the known Stirmark attack, which degrades the quality of the image while destroying the watermark, this paper presents a new approach which is based on the est...

متن کامل

Review on attacks, problems, and weaknesses of digital watermarking and the pixel reallocation attack

Watermark attacks are first categorized and explained with examples in this paper. We then propose a new image watermark attack called "Pixel Reallocation Attack". The proposed attack is a hybrid approach, which aims to decorrelate the embedded watermark with the original watermark. Since many watermarking detections are by correlating the testing image with the target watermark, it will not wo...

متن کامل

Inter-frame Collusion Attack in SS-N Video Watermarking System

Video watermarking is usually considered as watermarking of a set of still images. In frame-by-frame watermarking approach, each video frame is seen as a single watermarked image, so collusion attack is more critical in video watermarking. If the same or redundant watermark is used for embedding in every frame of video, the watermark can be estimated and then removed by watermark estimate remod...

متن کامل

Robust Digital Image-Adaptive Watermarking Using BSS Based Extraction Technique

In a digital watermarking scheme, it is not convenient to carry the original image all the time in order to detect the owner's signature from the watermarked image. Moreover, for those applications that require different watermarks for different copies, it is preferred to utilize some kind of watermark-independent algorithm for extraction process i.e. dewatermarking. Watermark embedding is perf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002