State-of-the-art digital watermarking attacks
Digital watermarking is a huge research area which is progressively growing. It covers theoretical studies, novel techniques, attacks and performance analysis. An embedded watermark may unintentionally or inadvertently be impaired by such processing. Other types of processing may be applied with...
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/24630/ http://irep.iium.edu.my/24630/1/1376C.pdf |
Summary: | Digital watermarking is a huge research area which is
progressively growing. It covers theoretical studies, novel
techniques, attacks and performance analysis. An embedded
watermark may unintentionally or inadvertently be impaired by
such processing. Other types of processing may be applied with
the explicit goal of hindering watermark reception. In
watermarking terminology, an “attack” is any processing that
may impair detection of the watermark or communication of the
information conveyed by the watermark. Broadly it can be
classified as Intentional Attacks and Non-Intentional Attacks.
The processed watermarked data is then called “attacked data”.
An important aspect of any Watermarking scheme is its
robustness against attacks. The notion of robustness is intuitively
clear: A watermark is robust if it cannot be impaired without
also rendering the attacked data useless. Watermark impairment
can be measured by criteria such as miss probability, probability
of bit error, or channel capacity. For multimedia, the usefulness
of the attacked data can be gauged by considering its perceptual
quality or distortion. Hence, robustness can be evaluated by
simultaneously considering watermark impairment and the
distortion of the attacked data. An attack succeeds in defeating a
watermarking scheme if it impairs the watermark beyond
acceptable limits while maintaining the perceptual quality of the
attacked data. In this paper, JPEG compression (quality 50 and
75), noise (Gaussian noise), distortion (blurring) and contrast
enhancement (histogram equalization and intensity adjustment)
are testified. Results shown that embedding gain and DWT
decomposition subbands were among the contribute against
attacks performed |
---|