A two-step watermarking attack using long-range correlation image restoration

This paper presents an efficient scheme for blind watermark attacking using the concept of matching of the long-range data. The main idea of the proposed attack is to add plenty of noise to the watermarked image and then try to restore an unwatermarked copy of the noisy image. The aim is to destroy the watermark information without accessing the parameters used during the watermark embedding process. So, it allows our approach to be completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. Experimental results show the proposed algorithm's superiority over several other traditional watermarking benchmarks such as Stirmark and Optimark. Peak signal-to-noise ratio of the watermarked image after applying the proposed attack is more than 45 dB, and the normalized cross-correlation for the extracted watermark is lower than 0·4, so the watermark is not detectable after our attack. Copyright © 2012 John Wiley & Sons, Ltd.

[1]  Mohammad S. Obaidat,et al.  Digital watermarking-based DCT and JPEG model , 2003, IEEE Trans. Instrum. Meas..

[2]  E. Todeva Networks , 2007 .

[3]  Shi-Jinn Horng,et al.  A wavelet-tree-based watermarking method using distance vector of binary cluster , 2009, Expert Syst. Appl..

[4]  Narendra Ahuja,et al.  A new wavelet-based scheme for watermarking images , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[5]  Atsuyuki Okabe,et al.  Spatial Tessellations: Concepts and Applications of Voronoi Diagrams , 1992, Wiley Series in Probability and Mathematical Statistics.

[6]  P. Kumsawat,et al.  A new approach for optimization in image watermarking by using genetic algorithms , 2005, IEEE Transactions on Signal Processing.

[7]  Yi Pan,et al.  A blind watermarking method using maximum wavelet coefficient quantization , 2009, Expert Syst. Appl..

[8]  Pingzhi Fan,et al.  An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization , 2008, IEEE Transactions on Multimedia.

[9]  Thierry Pun,et al.  Second Generation Benchmarking and Application Oriented Evaluation , 2001, Information Hiding.

[10]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[11]  Anastasios Tefas,et al.  A benchmarking protocol for watermarking methods , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[12]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[13]  David Zhang,et al.  Image information restoration based on long-range correlation , 2002, IEEE Trans. Circuits Syst. Video Technol..

[14]  Amirhossein Taherinia,et al.  A robust spread spectrum watermarking method using two levels DCT , 2009, Int. J. Electron. Secur. Digit. Forensics.

[15]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[16]  Amirhossein Taherinia,et al.  A New Watermarking Attack Using Long-Range Correlation Image Restoration , 2009, 2009 International Conference on Availability, Reliability and Security.

[17]  Takao Terano,et al.  Image copyright protection with forward error correction , 2009, Expert Syst. Appl..