Attack Algorithm on Watermarking with Public Watermark Detection

Article Preview

Abstract:

This paper proposes an attack algorithm for digital image watermarking based on independent component analysis (ICA). The paper gives a briefly introduction about ICA algorithm, and expatiates on the attack algorithm which we proposed. The algorithm uses an auxiliary image to remove the watermark signal from the host image based on blind signal separation technology. The paper also does some experiment to attack the watermark algorithm proposed by I J. Cox. The results show that this attack algorithm not only removes most of the digital watermark information, but also has little effect on the image’s peak signal to noise ratio. The paper also discusses the attack algorithm for different watermark signals and different auxiliary images; the effect of this attack algorithm is feasible.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 121-122)

Pages:

423-428

Citation:

Online since:

June 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2010 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Chen, T.H., Horng, G, Lee, W.B. A publicly verifiable copyright-proving scheme resistant to malicious attacks . IEEE Trans. Industrial Electron, 2005, 52(10): 327-334.

DOI: 10.1109/tie.2004.841083

Google Scholar

[2] D Kundur, D Hatzinakos. Diversity and Attack Characterization for Improved Robust Watermark.

Google Scholar

[3] Potdar.V. M , Han. S, Chang. E . A survey of digital image watermarking techniques, 2005 3rd IEEE International Conference on Industrial Informatics, 2005, 5(10): 709-716.

DOI: 10.1109/indin.2005.1560462

Google Scholar

[4] A. Hyvarinen. Fast and Robust fixed-point algorithms for independent component analysis . IEEE Trans. Neural Networks, 1999, 10 (3): 626~634.

DOI: 10.1109/72.761722

Google Scholar

[5] Yang et al. Adaptive on-line learning algorithm for blind separation: maximum entropy and minimum mutual information. Neural Network, 1997, 9(7): 1457-1481.

DOI: 10.1162/neco.1997.9.7.1457

Google Scholar

[6] Jieh-Ming Shieh, Der-Chyuan Lou and Ming-Chang Chang, A semi-blind digital watermarking scheme based on singular value decomposition. Computer Standards & Interfaces, 2006, 28(4): 428-440.

DOI: 10.1016/j.csi.2005.03.006

Google Scholar

[7] M. A. Suhail and M. S. Obaidat, Digital Watermarking-Based DCT and JPEG Model. IEEE Transactions on Instrumentation and Measurement, 2003, l (52): 1640-1647.

DOI: 10.1109/tim.2003.817155

Google Scholar

[8] GCW Ting, BM Goi, SH Heng, Attack on a semi-blind watermarking scheme based on singular value decomposition. Computer Standards & Interfaces, 2009, 31(2): 523-525.

DOI: 10.1016/j.csi.2008.02.007

Google Scholar

[9] I.J. Cox, Killian. J, Leighton F.T. etal, Secure spread spectrum watermarking for multimedia . IEEE Trans Image Processing, 1997, 6(12): 1673-1687.

DOI: 10.1109/83.650120

Google Scholar