State-of-the-art digital watermarking attacks
Digital watermarking is a huge research area which is progressively growing. It covers theoretical studies, novel techniques, attacks and performance analysis. An embedded watermark may unintentionally or inadvertently be impaired by such processing. Other types of processing may be applied with...
Main Authors: | , , , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2012
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/24630/ http://irep.iium.edu.my/24630/1/1376C.pdf |
id |
iium-24630 |
---|---|
recordtype |
eprints |
spelling |
iium-246302017-06-15T08:16:44Z http://irep.iium.edu.my/24630/ State-of-the-art digital watermarking attacks Khalifa, Othman Omran Yusof, Yusnita Hassan Abdalla Hashim, Aisha Olanrewaju, Rashidah Funke Q Science (General) Digital watermarking is a huge research area which is progressively growing. It covers theoretical studies, novel techniques, attacks and performance analysis. An embedded watermark may unintentionally or inadvertently be impaired by such processing. Other types of processing may be applied with the explicit goal of hindering watermark reception. In watermarking terminology, an “attack” is any processing that may impair detection of the watermark or communication of the information conveyed by the watermark. Broadly it can be classified as Intentional Attacks and Non-Intentional Attacks. The processed watermarked data is then called “attacked data”. An important aspect of any Watermarking scheme is its robustness against attacks. The notion of robustness is intuitively clear: A watermark is robust if it cannot be impaired without also rendering the attacked data useless. Watermark impairment can be measured by criteria such as miss probability, probability of bit error, or channel capacity. For multimedia, the usefulness of the attacked data can be gauged by considering its perceptual quality or distortion. Hence, robustness can be evaluated by simultaneously considering watermark impairment and the distortion of the attacked data. An attack succeeds in defeating a watermarking scheme if it impairs the watermark beyond acceptable limits while maintaining the perceptual quality of the attacked data. In this paper, JPEG compression (quality 50 and 75), noise (Gaussian noise), distortion (blurring) and contrast enhancement (histogram equalization and intensity adjustment) are testified. Results shown that embedding gain and DWT decomposition subbands were among the contribute against attacks performed 2012-07-03 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/24630/1/1376C.pdf Khalifa, Othman Omran and Yusof, Yusnita and Hassan Abdalla Hashim, Aisha and Olanrewaju, Rashidah Funke (2012) State-of-the-art digital watermarking attacks. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia, 3-5th July 2012, Seri Pacific Hotel Kuala Lumpur, Malaysia. |
repository_type |
Digital Repository |
institution_category |
Local University |
institution |
International Islamic University Malaysia |
building |
IIUM Repository |
collection |
Online Access |
language |
English |
topic |
Q Science (General) |
spellingShingle |
Q Science (General) Khalifa, Othman Omran Yusof, Yusnita Hassan Abdalla Hashim, Aisha Olanrewaju, Rashidah Funke State-of-the-art digital watermarking attacks |
description |
Digital watermarking is a huge research area which is
progressively growing. It covers theoretical studies, novel
techniques, attacks and performance analysis. An embedded
watermark may unintentionally or inadvertently be impaired by
such processing. Other types of processing may be applied with
the explicit goal of hindering watermark reception. In
watermarking terminology, an “attack” is any processing that
may impair detection of the watermark or communication of the
information conveyed by the watermark. Broadly it can be
classified as Intentional Attacks and Non-Intentional Attacks.
The processed watermarked data is then called “attacked data”.
An important aspect of any Watermarking scheme is its
robustness against attacks. The notion of robustness is intuitively
clear: A watermark is robust if it cannot be impaired without
also rendering the attacked data useless. Watermark impairment
can be measured by criteria such as miss probability, probability
of bit error, or channel capacity. For multimedia, the usefulness
of the attacked data can be gauged by considering its perceptual
quality or distortion. Hence, robustness can be evaluated by
simultaneously considering watermark impairment and the
distortion of the attacked data. An attack succeeds in defeating a
watermarking scheme if it impairs the watermark beyond
acceptable limits while maintaining the perceptual quality of the
attacked data. In this paper, JPEG compression (quality 50 and
75), noise (Gaussian noise), distortion (blurring) and contrast
enhancement (histogram equalization and intensity adjustment)
are testified. Results shown that embedding gain and DWT
decomposition subbands were among the contribute against
attacks performed |
format |
Conference or Workshop Item |
author |
Khalifa, Othman Omran Yusof, Yusnita Hassan Abdalla Hashim, Aisha Olanrewaju, Rashidah Funke |
author_facet |
Khalifa, Othman Omran Yusof, Yusnita Hassan Abdalla Hashim, Aisha Olanrewaju, Rashidah Funke |
author_sort |
Khalifa, Othman Omran |
title |
State-of-the-art digital watermarking attacks |
title_short |
State-of-the-art digital watermarking attacks |
title_full |
State-of-the-art digital watermarking attacks |
title_fullStr |
State-of-the-art digital watermarking attacks |
title_full_unstemmed |
State-of-the-art digital watermarking attacks |
title_sort |
state-of-the-art digital watermarking attacks |
publishDate |
2012 |
url |
http://irep.iium.edu.my/24630/ http://irep.iium.edu.my/24630/1/1376C.pdf |
first_indexed |
2023-09-18T20:36:55Z |
last_indexed |
2023-09-18T20:36:55Z |
_version_ |
1777409107815301120 |