State-of-the-art digital watermarking attacks

Digital watermarking is a huge research area which is progressively growing. It covers theoretical studies, novel techniques, attacks and performance analysis. An embedded watermark may unintentionally or inadvertently be impaired by such processing. Other types of processing may be applied with...

Full description

Bibliographic Details
Main Authors: Khalifa, Othman Omran, Yusof, Yusnita, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke
Format: Conference or Workshop Item
Language:English
Published: 2012
Subjects:
Online Access:http://irep.iium.edu.my/24630/
http://irep.iium.edu.my/24630/1/1376C.pdf
id iium-24630
recordtype eprints
spelling iium-246302017-06-15T08:16:44Z http://irep.iium.edu.my/24630/ State-of-the-art digital watermarking attacks Khalifa, Othman Omran Yusof, Yusnita Hassan Abdalla Hashim, Aisha Olanrewaju, Rashidah Funke Q Science (General) Digital watermarking is a huge research area which is progressively growing. It covers theoretical studies, novel techniques, attacks and performance analysis. An embedded watermark may unintentionally or inadvertently be impaired by such processing. Other types of processing may be applied with the explicit goal of hindering watermark reception. In watermarking terminology, an “attack” is any processing that may impair detection of the watermark or communication of the information conveyed by the watermark. Broadly it can be classified as Intentional Attacks and Non-Intentional Attacks. The processed watermarked data is then called “attacked data”. An important aspect of any Watermarking scheme is its robustness against attacks. The notion of robustness is intuitively clear: A watermark is robust if it cannot be impaired without also rendering the attacked data useless. Watermark impairment can be measured by criteria such as miss probability, probability of bit error, or channel capacity. For multimedia, the usefulness of the attacked data can be gauged by considering its perceptual quality or distortion. Hence, robustness can be evaluated by simultaneously considering watermark impairment and the distortion of the attacked data. An attack succeeds in defeating a watermarking scheme if it impairs the watermark beyond acceptable limits while maintaining the perceptual quality of the attacked data. In this paper, JPEG compression (quality 50 and 75), noise (Gaussian noise), distortion (blurring) and contrast enhancement (histogram equalization and intensity adjustment) are testified. Results shown that embedding gain and DWT decomposition subbands were among the contribute against attacks performed 2012-07-03 Conference or Workshop Item PeerReviewed application/pdf en http://irep.iium.edu.my/24630/1/1376C.pdf Khalifa, Othman Omran and Yusof, Yusnita and Hassan Abdalla Hashim, Aisha and Olanrewaju, Rashidah Funke (2012) State-of-the-art digital watermarking attacks. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia, 3-5th July 2012, Seri Pacific Hotel Kuala Lumpur, Malaysia.
repository_type Digital Repository
institution_category Local University
institution International Islamic University Malaysia
building IIUM Repository
collection Online Access
language English
topic Q Science (General)
spellingShingle Q Science (General)
Khalifa, Othman Omran
Yusof, Yusnita
Hassan Abdalla Hashim, Aisha
Olanrewaju, Rashidah Funke
State-of-the-art digital watermarking attacks
description Digital watermarking is a huge research area which is progressively growing. It covers theoretical studies, novel techniques, attacks and performance analysis. An embedded watermark may unintentionally or inadvertently be impaired by such processing. Other types of processing may be applied with the explicit goal of hindering watermark reception. In watermarking terminology, an “attack” is any processing that may impair detection of the watermark or communication of the information conveyed by the watermark. Broadly it can be classified as Intentional Attacks and Non-Intentional Attacks. The processed watermarked data is then called “attacked data”. An important aspect of any Watermarking scheme is its robustness against attacks. The notion of robustness is intuitively clear: A watermark is robust if it cannot be impaired without also rendering the attacked data useless. Watermark impairment can be measured by criteria such as miss probability, probability of bit error, or channel capacity. For multimedia, the usefulness of the attacked data can be gauged by considering its perceptual quality or distortion. Hence, robustness can be evaluated by simultaneously considering watermark impairment and the distortion of the attacked data. An attack succeeds in defeating a watermarking scheme if it impairs the watermark beyond acceptable limits while maintaining the perceptual quality of the attacked data. In this paper, JPEG compression (quality 50 and 75), noise (Gaussian noise), distortion (blurring) and contrast enhancement (histogram equalization and intensity adjustment) are testified. Results shown that embedding gain and DWT decomposition subbands were among the contribute against attacks performed
format Conference or Workshop Item
author Khalifa, Othman Omran
Yusof, Yusnita
Hassan Abdalla Hashim, Aisha
Olanrewaju, Rashidah Funke
author_facet Khalifa, Othman Omran
Yusof, Yusnita
Hassan Abdalla Hashim, Aisha
Olanrewaju, Rashidah Funke
author_sort Khalifa, Othman Omran
title State-of-the-art digital watermarking attacks
title_short State-of-the-art digital watermarking attacks
title_full State-of-the-art digital watermarking attacks
title_fullStr State-of-the-art digital watermarking attacks
title_full_unstemmed State-of-the-art digital watermarking attacks
title_sort state-of-the-art digital watermarking attacks
publishDate 2012
url http://irep.iium.edu.my/24630/
http://irep.iium.edu.my/24630/1/1376C.pdf
first_indexed 2023-09-18T20:36:55Z
last_indexed 2023-09-18T20:36:55Z
_version_ 1777409107815301120