Attacking visible watermarking schemes

Visible watermarking schemes are important intellectual property rights (IPR) protection mechanisms for digital images and videos that have to be released for certain purposes but illegal reproductions of them are prohibited. Visible watermarking techniques protect digital contents in a more active manner, which is quite different from the invisible watermarking techniques. Digital data embedded with visible watermarks will contain recognizable but unobtrusive copyright patterns, and the details of the host data should still exist. The embedded pattern of a useful visible watermarking scheme should be difficult or even impossible to be removed unless intensive and expensive human labors are involved. In this paper, we propose an attacking scheme against current visible image watermarking techniques. After manually selecting the watermarked areas, only few human interventions are required. For watermarks purely composed of thin patterns, basic image recovery techniques can completely remove the embedded patterns. For more general watermarks consisting of thick patterns, not only information in surrounding unmarked areas but also information within watermarked areas will be utilized to correctly recover the host image. Although the proposed scheme does not guarantee that the recovered images will be exactly identical to the unmarked originals, the structure of the embedded pattern will be seriously destroyed and a perceptually satisfying recovered image can be obtained. In other words, a general attacking scheme based on the contradictive requirements of current visible watermarking techniques is worked out. Thus, the robustness of current visible watermarking schemes for digital images is doubtful and needs to be improved.

[1]  Linda G. Shapiro,et al.  Computer and Robot Vision , 1991 .

[2]  Anil C. Kokaram,et al.  Interpolation of missing data in image sequences , 1995, IEEE Trans. Image Process..

[3]  Gordon W. Braudaway,et al.  Protecting publicly available images with a visible image watermark , 1996, Electronic Imaging.

[4]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[5]  Shih-Fu Chang,et al.  Embedding visible video watermarks in the compressed domain , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[6]  Wenjun Zeng,et al.  Image-adaptive watermarking using visual models , 1998, IEEE J. Sel. Areas Commun..

[7]  Mohan S. Kankanhalli,et al.  A dual watermarking technique for images , 1999, MULTIMEDIA '99.

[8]  Mohan S. Kankanhalli,et al.  Adaptive visible watermarking of images , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[9]  Ja-Ling Wu,et al.  Hidden digital watermarks in images , 1999, IEEE Trans. Image Process..

[10]  Guillermo Sapiro,et al.  Image inpainting , 2000, SIGGRAPH.

[11]  Pei-Min Chen,et al.  A visible watermarking mechanism using a statistic approach , 2000, WCC 2000 - ICSP 2000. 2000 5th International Conference on Signal Processing Proceedings. 16th World Computer Congress 2000.

[12]  Mohan S. Kankanhalli,et al.  A DCT domain visible watermarking technique for images , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[13]  Yongjian Hu,et al.  Wavelet domain adaptive visible watermarking , 2001 .