Attacks on digital watermarks: classification, estimation based attacks, and benchmarks
read more
Citations
Digital Watermarking
Genetic watermarking based on transform-domain techniques
Data-Hiding Codes
Combined DWT-DCT Digital Image Watermarking
Advances in Digital Video Content Protection
References
Secure spread spectrum watermarking for multimedia
DCT quantization matrices visually optimized for individual images
Information-theoretic analysis of information hiding
Fair benchmark for image watermarking systems
A Stochastic Approach to Content Adaptive Digital Image Watermarking
Related Papers (5)
Frequently Asked Questions (15)
Q2. What are the future works mentioned in the paper "Attacks on digital watermarks: classification, estimation-based attacks, and benchmarks" ?
It is shown that this approach is related to denoising, but can be extended to a variety of different attack methods. Next the authors describe how an embedder can try to resist estimation based attacks, which leads to the concept of PSC-compliant watermarks or watermarks adapted to the NVF, depending on the application and signal model at hand. Finally, the authors explain how considering the watermarking and attacking problem as a game between embedder and attacker can be exploited to find the watermark capacity, when facing an optimized attack with a constrained attack distortion.
Q3. What are the common embedding techniques?
Commonly used embedding techniques can be classified into additive [2], multiplicative [2], and quantization-based schemes [3, 4].
Q4. What are the potential applications of digital watermarking?
Potential applications of digital watermarking include copyright protection, distribution tracing, authentication, and conditional access control.
Q5. What is the way to filter out watermarks?
Watermarks embedded into signal components with low variance (e.g., high frequencies or flat regions in images) will be filtered out by the optimized attacks, while watermarks embedded into signal components with high variance are more efficiently disturbed by additive noise.
Q6. What is the way to achieve the performance of a watermark?
At low distortion levels, white watermarks perform near optimally, while at high distortion, PSC-compliant watermarks are more appropriate.
Q7. What is the purpose of the Stirmark benchmark?
While the Stirmark benchmark is an excellent tool for measuring the robustness of watermarking algorithms, it is heavily weighted toward geometric transformations, which do not take intoaccount prior information about the watermark.
Q8. What is the way to improve the robustness of the watermarking scheme?
Using sophisticated psycho-acoustic or psycho-visual models, more appropriate masks M can be applied to enhance the robustness of the watermarking scheme.
Q9. What is the idealized theoretical approach for analyzing estimation-based attacks?
An idealized theoretical approach [10] for analyzing estimation-based attacks treats the original signal and watermark as independent, zero-mean, stationary, colored Gaussian random processes.
Q10. What is the way to use the watermark?
It appears that the optimal watermark power allocation for reliable watermarking is dependent on the amount of distortion that can be introduced by an attacker.
Q11. What is the way to test the accuracy of the watermark?
For image watermarking, image denoising provides a natural way to develop estimation-based attacks [13] optimized for the statistics of images, although optimality might be difficult to prove.
Q12. What is the motivation for the attacker to remove the watermark?
The attacker is motivated to reduce the maximum rate of reliable communication also by exploiting the HVS and the possibility to remove the watermark based on different models of the image.
Q13. How is the score assigned to the watermark?
In order to produce a score relative to the benchmark, a score of 1 is assigned when the watermark is decoded and 0 when it is not decoded.
Q14. How does the attack drive the correlation to zero?
To drive the correlation to zero, the attack must make the distortion as large as the power of the original data, so the attacked data is unlikely to be useful.
Q15. What is the way to remove the watermark?
the attacker will try as much as possible to utilize the advantages of denoising and remove the watermark from flat areas without visual distortions and even enhancing the PSNR.