New watermark-removal method based on Eigen-image energy

Most watermark-removal methods treat watermarks as noise and apply denoising approaches to remove them. However, denoising methods remove not only this watermark energy, but also some of the energy of the original image. A trade-off therefore exists: if not enough of the watermark is removed, then it will still be detected by probabilistic methods, but if too much is removed, the image quality will be noticeably poor. To solve this problem, the relationships among the energies of the original image, the watermark and the watermarked image are initially determined using stochastic models. Then the energy of the watermark is estimated using just-noticeable-distortion (JND). Finally, the watermark energy is removed from the watermarked image using the energy distribution of its Eigen-images. The experimental results show that the proposed approach yields a mean peak signal-to-noise ratio (PSNR) of the predicted images that is 2.2 dB higher than that obtained using the adaptive Wiener filter, and a mean normalised correlation (NC) value of the extracted watermarks that is 0.27 lower than that obtained using the adaptive Wiener filter. In removing watermark energy from 100 randomly selected watermarked images in which watermarks were embedded using the ‘broken arrows (BA)’ algorithm proposed for the second breaking our watermarking system (BOWS-2) contest, the mean PSNR of 100 predicted images is 24.1 dB and the proposed approach successfully removed watermarks from 90 of these images. This result exceeds the minimum requirement of PSNR 20 dB for the BOWS-2 contest. Clearly, the proposed approach is a very effective watermark-removal approach for removing watermarks.

[1]  Thierry Pun,et al.  Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..

[2]  Soontorn Oraintara,et al.  Multichannel SVD-based image de-noising , 2005, 2005 IEEE International Symposium on Circuits and Systems.

[3]  Konstantinos Konstantinides,et al.  Statistical analysis of effective singular values in matrix rank determination , 1988, IEEE Trans. Acoust. Speech Signal Process..

[4]  Paul C. H. Lee Performance analysis of an MPEG-II audio/video player , 1999, IEEE Trans. Consumer Electron..

[5]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[6]  Yi Shi,et al.  Embedding image watermarks in dc components , 2000, IEEE Trans. Circuits Syst. Video Technol..

[7]  Andreas Westfeld A regression-based restoration technique for automated watermark removal , 2008, MM&Sec '08.

[8]  Wei Liu,et al.  Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking , 2007, IEEE Trans. Inf. Forensics Secur..

[9]  Z.L. Shi,et al.  SVD-Based Image De-Nosing with the Minimum Engergy Model , 2006, 2006 World Automation Congress.

[10]  Thierry Pun,et al.  A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.

[11]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[12]  Wenjun Zeng,et al.  Optimum Detection for Spread-Spectrum Watermarking That Employs Self-Masking , 2007, IEEE Transactions on Information Forensics and Security.

[13]  Wenkai Lu,et al.  Adaptive noise attenuation of seismic image using singular value decomposition and texture direction detection , 2002, Proceedings. International Conference on Image Processing.

[14]  Thierry Pun,et al.  Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.

[15]  Haifeng Zhang,et al.  SVD-Based Image De-nosing with the Minimum Energy Model , 2008, 2008 Congress on Image and Signal Processing.

[16]  Chun-Hsien Chou,et al.  A perceptually tuned subband image coder based on the measure of just-noticeable-distortion profile , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[17]  Qiang Li,et al.  Adaptive DWT-SVD Domain Image Watermarking Using Human Visual Model , 2007, The 9th International Conference on Advanced Communication Technology.

[18]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[19]  Mohammed J. Islam,et al.  An Adaptive Digital Image Watermarking Technique for Copyright Protection , 2007 .

[20]  Oscar C. Au,et al.  A capacity estimation technique for JPEG-to-JPEG image watermarking , 2003, IEEE Trans. Circuits Syst. Video Technol..

[21]  Teddy Furon,et al.  Broken Arrows , 2008, EURASIP J. Inf. Secur..

[22]  Anastasios Tefas,et al.  A benchmarking protocol for watermarking methods , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[23]  S.P. Maity,et al.  Robust image watermarking using multiresolution analysis , 2004, Proceedings of the IEEE INDICON 2004. First India Annual Conference, 2004..