Attack modelling: towards a second generation watermarking benchmark

被引:173
作者
Voloshynovskiy, S [1 ]
Pereira, S [1 ]
Iquise, V [1 ]
Pun, T [1 ]
机构
[1] Univ Geneva, CUI, CH-1211 Geneva 4, Switzerland
关键词
digital watermarking; watermarking attacks; benchmarking; stochastic image modeling; estimation; decoding;
D O I
10.1016/S0165-1684(01)00039-1
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Digital image watermarking techniques for copyright protection have become increasingly robust, The best algorithms perform well against the now standard benchmark tests included in the Stirmark package. However the stirmark tests are limited since in general they do not properly model the watermarking process and consequently are limited in their potential to removing the best watermarks. Here we propose a stochastic formulation of watermarking attacks using an estimation-based concept. The proposed attacks consist of two main stages: (a) watermark or cover data estimation; (b) modification of stego data aiming at disrupting the watermark detection and of resolving copyrights, taking into account the statistics of the embedded watermark and exploiting features of the human visual system. In the second part of the paper we propose a "second generation benchmark", We follow the model of the Stirmark benchmark and propose the 6 following categories of tests: denoising attacks and wavelet compression, watermark copy attack, synchronization removal, denoising/compression followed by perceptual remodulation, denoising and random bending. Our results indicate that even though some algorithms perform well against the Stirmark benchmark, almost all algorithms perform poorly against our benchmark. This indicates that much work remains to be done before claims about "robust" watermarks can be made. We also propose a new method of evaluating image quality based on the Watson metric which overcomes the limitations of the PSNR. (C) 2001 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:1177 / 1214
页数:38
相关论文
共 66 条
[1]  
ALATTAR A, 2000, SPIE P, V3971
[2]  
[Anonymous], SIGNAL DETECTION NON
[3]  
[Anonymous], 3 INT WORKSH INF HID
[4]  
ATAKONDA K, 1998, IEEE INT C IM PROC 9
[5]   A DCT-domain system for robust image watermarking [J].
Barni, M ;
Bartolini, F ;
Cappellini, V ;
Piva, A .
SIGNAL PROCESSING, 1998, 66 (03) :357-372
[6]   Capacity of the watermark-channel: How many bits can be hidden within a digital image? [J].
Barni, M ;
Bartolini, F ;
De Rosa, A ;
Piva, A .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 :437-448
[7]  
BARNI M, UNPUB IEEE T IMAGE P
[8]  
CHANG S, 1998, P 5 IEEE INT C IM PR
[9]   Deterministic edge-preserving regularization in computed imaging [J].
Charbonnier, P ;
BlancFeraud, L ;
Aubert, G ;
Barlaud, M .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (02) :298-311
[10]  
CHEN B, 1999, SPIE SECURITY WATERM, V3657