Review on attacks, problems, and weaknesses of digital watermarking and the pixel reallocation attack

Watermark attacks are first categorized and explained with examples in this paper. We then propose a new image watermark attack called 'Pixel Reallocation Attack'. The proposed attack is a hybrid approach, which aims to decorrelate the embedded watermark with the original watermark. Since many watermarking detections are by correlating the testing image with the target watermark, it will not work once we decorrelate the embedded watermark. For example, the geometrical transformation attacks desynchronize the correlation detector with the testing image leading to detection failure. However, by inserting a template or grid into the watermarked image can make inverse transformation possible and the watermark can be retrieved. If we apply transformations to every single pixel locally, independently and randomly, inverse transformation will not be possible and the attack will be successful since the embedded watermark is not correlated with the original watermark. Experiment shows that single technique approach needs a larger distortion to the image in order to attack the image successfully. We also tested our attack with commercial watermarking software. It cannot detect the watermark after we applied the proposed hybrid attack to the watermarked image.

[1]  D. Pearson,et al.  Attack operators for digitally watermarked images , 1998 .

[2]  Ahmed H. Tewfik,et al.  Robust audio watermarking using perceptual masking , 1998, Signal Process..

[3]  Thierry Pun,et al.  Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.

[4]  Sai Ho Kwok,et al.  Adaptive Audio Watermarking Scheme for Copyright Protection , 2000, PACIS.

[5]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[6]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..

[7]  Jean-Paul M. G. Linnartz,et al.  Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[8]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[9]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.