WAN: Watermarking Attack Network

Multi-bit watermarking (MW) has been developed to improve robustness against signal processing operations and geometric distortions. To this end, several benchmark tools that simulate possible attacks on images to test robustness are available. However, limitations in these general attacks exist since they cannot exploit specific characteristics of the targeted MW. In addition, these attacks are usually devised without consideration for visual quality, which rarely occurs in the real world. To address these limitations, we propose a watermarking attack network (WAN), a fully trainable watermarking benchmark tool, that utilizes the weak points of the target MW and removes inserted watermark and inserts inverted bit information, thereby considerably reducing watermark extractability. To hinder the extraction of hidden information while ensuring high visual quality, we utilize a residual dense blocks-based architecture specialized in local and global feature learning. A novel watermarking attack loss is introduced to break the MW systems. We empirically demonstrate that the WAN can successfully fool a variety of MW systems.

[1]  Deepa Kundur,et al.  Digital watermarking using multiresolution wavelet decomposition , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).

[2]  Tomás Pevný,et al.  "Break Our Steganographic System": The Ins and Outs of Organizing BOSS , 2011, Information Hiding.

[3]  Jinseok Park,et al.  Two-Stream Network for Detecting Double Compression of H.264 Videos , 2019, 2019 IEEE International Conference on Image Processing (ICIP).

[4]  Heung-Kyu Lee,et al.  A Robust Blind Watermarking Using Convolutional Neural Network , 2017, ArXiv.

[5]  Thierry Pun,et al.  Second Generation Benchmarking and Application Oriented Evaluation , 2001, Information Hiding.

[6]  Jong-Uk Hou,et al.  A SIFT features based blind watermarking for DIBR 3D images , 2018, Multimedia Tools and Applications.

[7]  In-Jae Yu,et al.  Paired mini-batch training: A new deep network training for image forensics and steganalysis , 2018, Signal Process. Image Commun..

[8]  Jan Kautz,et al.  Loss Functions for Image Restoration With Neural Networks , 2017, IEEE Transactions on Computational Imaging.

[9]  Minh N. Do,et al.  The Nonsubsampled Contourlet Transform: Theory, Design, and Applications , 2006, IEEE Transactions on Image Processing.

[10]  Taha H. Rassem,et al.  Block-based discrete wavelet transform-singular value decomposition image watermarking scheme using human visual system characteristics , 2016, IET Image Process..

[11]  Heung-Kyu Lee,et al.  Robust DT-CWT Watermarking for DIBR 3D Images , 2012, IEEE Transactions on Broadcasting.

[12]  Gang Wang,et al.  An improved color image watermarking algorithm based on QR decomposition , 2015, Multimedia Tools and Applications.

[13]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[14]  Gene H. Golub,et al.  Singular value decomposition and least squares solutions , 1970, Milestones in Matrix Computation.

[15]  Henrique S. Malvar,et al.  Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..

[16]  Thierry Pun,et al.  Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..

[17]  Heung-Kyu Lee,et al.  Median Filtered Image Restoration and Anti-Forensics Using Adversarial Networks , 2018, IEEE Signal Processing Letters.

[18]  Jong-Uk Hou,et al.  Robust Template-Based Watermarking for DIBR 3D Images , 2018, Applied Sciences.

[19]  Bingyang Wen,et al.  ROMark: A Robust Watermarking System Using Adversarial Training , 2019, ArXiv.

[20]  Mauro Barni,et al.  A DCT-domain system for robust image watermarking , 1998, Signal Process..

[21]  Yuan-Pei Lin,et al.  Wavelet tree quantization for copyright protection watermarking , 2004, IEEE Transactions on Image Processing.

[22]  Javaid A. Sheikh,et al.  Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing , 2016, Digit. Signal Process..

[23]  Anastasios Tefas,et al.  9.5 – Watermarking Techniques for Image Authentication and Copyright Protection , 2005 .

[24]  Fernando Pérez-González,et al.  Spread-Spectrum Watermarking Security , 2009, IEEE Transactions on Information Forensics and Security.

[25]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[26]  Ja-Ling Wu,et al.  A Digital Blind Watermarking for Depth-Image-Based Rendering 3D Images , 2011, IEEE Transactions on Broadcasting.

[27]  Jinseok Park,et al.  Content-Aware Image Resizing Detection Using Deep Neural Network , 2019, 2019 IEEE International Conference on Image Processing (ICIP).

[28]  Yun Fu,et al.  Residual Dense Network for Image Super-Resolution , 2018, 2018 IEEE/CVF Conference on Computer Vision and Pattern Recognition.

[29]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[30]  Heung-Kyu Lee,et al.  Finding robust domain from attacks: A learning framework for blind watermarking , 2017, Neurocomputing.

[31]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[32]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.