Using digital watermarks with image signatures to mitigate the threat of the copy attack
نویسندگان
چکیده
In some applications, the utility of an image watermarking system is greatly reduced if an attacker is able to extract a watermark from a marked image and re-embed it into an unmarked image. This threat is known as the copy attack. In this paper, we develop an image signature scheme to be used with digital watermarks to create an image watermarking system that is more resistant to this attack. We describe the image signature algorithm in detail, and how it may be fused with a digital watermark. We then present preliminary results of our system using an image test set of highly correlated images.
منابع مشابه
Detection of Copy-Move Forgery in Digital Images Using Scale Invariant Feature Transform Algorithm and the Spearman Relationship
Increased popularity of digital media and image editing software has led to the spread of multimedia content forgery for various purposes. Undoubtedly, law and forensic medicine experts require trustworthy and non-forged images to enforce rights. Copy-move forgery is the most common type of manipulation of digital images. Copy-move forgery is used to hide an area of the image or to repeat a por...
متن کاملThe Watermark Copy Attack
Research in digital watermarking has progressed along two paths. While new watermarking technologies are being developed, some researchers are also investigating di erent ways of attacking digital watermarks. Common attacks to watermarks usually aim to destroy the embedded watermark or to impair its detection. In this paper we propose a conceptually new attack for digitally watermarked images. ...
متن کاملWatermark Synchronization in Camera Phones and Scanning Devices
The development of Internet and numerous hardware and software applications have created a need for copy and copyright protection of the content. One possible way to fill this need is to use watermarking. The idea of digital image watermarking is to hide information to the image so that a human eye cannot detect the transformations made to the image, but a computer can read the hidden informati...
متن کاملTowards robust image watermarking: combining content-dependent key, moment normalization, and side-informed embedding
In digital watermarking robustness is still a challenging problem if di erent sets of attacks need to be tolerated simultaneously In this paper we deal with this problem by using an integrated solution of side informed embedding moment normalization and content dependent watermarks First a new image watermarking method designed based on the concept of communications with side information is pro...
متن کاملAttack modelling: towards a second generation watermarking benchmark
Digital image watermarking techniques for copyright protection have become increasingly robust. The best algorithms performwell against the now standard benchmark tests included in the Stirmark package. However the stirmark tests are limited since in general they do not properly model the watermarking process and consequently are limited in their potential to removing the best watermarks. Here ...
متن کامل