Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks

In this paper we present an attack to fixed depth image watermarks. The attack is based on histogram analysis of a watermarked image. With this attack, the watermark can often be reconstructed from just a few images, without using the detector.

[1]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[2]  N. Ream Discrete-Time Signal Processing , 1977 .

[3]  Ioannis Pitas,et al.  Copyright protection of images using robust digital signatures , 1996, 1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings.

[4]  Alan V. Oppenheim,et al.  Discrete-Time Signal Pro-cessing , 1989 .

[5]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[6]  Ioannis Pitas,et al.  Chaotic Mixing of Digital Images and Applications to Watermarking , 1996 .