Expanding the class of watermark de-synchronization attacks

Geometric transformations whereby the watermark embedder and detector are de-synchronized are known to be one of the most serious threats against any digital watermarking scheme, noticeably against those operating on still images. Despite their importance, only a few classes of geometric attacks are considered in the literature, including global geometric transformations and the random bending attack first introduced by the popular Stirmark software. In this paper we introduce two new classes of de-synchronization attacks (DAs), that extend the class of local geometric attacks so to allow for more powerful and less intrusive attacks. The effectiveness of the new classes of DAs is evaluated from different perspectives including: perceptual intrusiveness and de-synchronization efficacy. This work can be seen as a first step towards the characterization of the whole class of perceptually admissible DAs, which in turn is an essential step towards the development of a new class of watermarking systems that can effectively cope with them.

[1]  Iwan Setyawan,et al.  Exhaustive geometrical search and the false positive watermark detection probability , 2003, IS&T/SPIE Electronic Imaging.

[2]  Mauro Barni,et al.  A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..

[3]  Gabriela Csurka,et al.  Template based recovery of Fourier-based watermarks using log-polar and log-log maps , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[4]  Martin Kutter,et al.  Watermarking resistance to translation, rotation, and scaling , 1999, Other Conferences.

[5]  Ross J. Anderson,et al.  Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[6]  Neri Merhav,et al.  An Information – Theoretic View of Watermark Embedding – Detection and Geometric Attacks , 2005 .

[7]  Thierry Pun,et al.  Fast Robust Template Matching for Affine Resistant Image Watermarks , 1999, Information Hiding.

[8]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[9]  Benoit M. Macq,et al.  Generalized 2-D cyclic patterns for secret watermark generation , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[10]  Thierry Pun,et al.  Multibit digital watermarking robust against local nonlinear geometrical distortions , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[11]  M. Kutter Watermaking resisting to translation, rotation, and scaling , 1998 .

[12]  J. Besag On the Statistical Analysis of Dirty Pictures , 1986 .

[13]  Mauro Barni,et al.  Effectiveness of exhaustive search and template matching against watermark desynchronization , 2005, IEEE Signal Processing Letters.

[14]  Mauro Barni,et al.  Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding , 2005, IEEE Transactions on Signal Processing.

[15]  Ingemar J. Cox,et al.  Rotation, scale, and translation resilient watermarking for images , 2001, IEEE Trans. Image Process..

[16]  Mauro Barni,et al.  Improved wavelet-based watermarking through pixel-wise masking , 2001, IEEE Trans. Image Process..

[17]  Ingemar J. Cox,et al.  Applying informed coding and embedding to design a robust high-capacity watermark , 2004, IEEE Transactions on Image Processing.

[18]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[19]  John Odentrantz,et al.  Markov Chains: Gibbs Fields, Monte Carlo Simulation, and Queues , 2000, Technometrics.

[20]  Mauro Barni,et al.  Perceptual quality evaluation of geometric distortions in images , 2007, Electronic Imaging.

[21]  Thomas S. Huang,et al.  Image processing , 1971 .

[22]  Stan Z. Li,et al.  Markov Random Field Modeling in Computer Vision , 1995, Computer Science Workbench.