The watermark copy attack

被引:78
作者
Kutter, M [1 ]
Voloshynovskiy, S [1 ]
Herrigel, A [1 ]
机构
[1] Digital Copyright Technol, CH-8004 Zurich, Switzerland
来源
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II | 2000年 / 3971卷
关键词
digital watermarking; attack; robustness;
D O I
10.1117/12.384991
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Research in digital watermarking has progressed along two paths. While new watermarking technologies are being developed, some researchers are also investigating different ways of attacking digital watermarks. Common attacks to watermarks usually aim to destroy the embedded watermark or to impair its detection. In this paper we propose a conceptually new attack for digitally watermarked images. The proposed attack does not destroy an embedded watermark, but copies it from one image to a different image. Although this new attack does not destroy a watermark or impair its detection, it creates new challenges, especially when watermarks are used for copyright protection and identification. The process of copying the watermark requires neither algorithmic knowledge of the watermarking technology nor the watermarking key. The attack is based on an estimation of the embedded watermark in the spatial domain through a filtering process. The estimate of the watermark is then adapted and inserted into the target image. To illustrate the performance of the proposed attack we applied it to commercial and non-commercial watermarking schemes. The experiments showed that the attack is very effective in copying a watermark from one image to a different image. In addition, we have a closer look at application dependent implications of this new attack.
引用
收藏
页码:371 / 380
页数:10
相关论文
共 16 条
[1]  
CARL W, 1991, PROBABILITY STOCHAST
[2]  
COX IJ, 1997, P INT C IM PROC ICIP
[3]  
COX IJ, 1997, IEEE J SELECTED AREA
[4]   Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications [J].
Craver, S ;
Memon, N ;
Yeo, BL ;
Yeung, MM .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :573-586
[5]   Multimedia watermarking techniques [J].
Hartung, F ;
Kutter, M .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1079-1107
[6]  
KUHN MG, 1997, STIRMARK NOV
[7]   A fair benchmark for image watermarking systems [J].
Kutter, M ;
Petitcolas, FAP .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 :226-239
[8]  
KUTTER M, 1999, THESIS SWISS FED I T
[9]  
LANGELAAR GC, 1998, P EUSIPCO 98, V4, P2281
[10]  
Lim J. S., 1990, Two-dimensional signal and image processing