Attack modelling: towards a second generation watermarking benchmark

Digital image watermarking techniques for copyright protection have become increasingly robust. The best algorithms perform well against the now standard benchmark tests included in the Stirmark package. However the stirmark tests are limited since in general they do not properly model the watermark...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Signal processing 2001-06, Vol.81 (6), p.1177-1214
Hauptverfasser: Voloshynovskiy, S., Pereira, S., Iquise, V., Pun, T.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1214
container_issue 6
container_start_page 1177
container_title Signal processing
container_volume 81
creator Voloshynovskiy, S.
Pereira, S.
Iquise, V.
Pun, T.
description Digital image watermarking techniques for copyright protection have become increasingly robust. The best algorithms perform well against the now standard benchmark tests included in the Stirmark package. However the stirmark tests are limited since in general they do not properly model the watermarking process and consequently are limited in their potential to removing the best watermarks. Here we propose a stochastic formulation of watermarking attacks using an estimation-based concept. The proposed attacks consist of two main stages: (a) watermark or cover data estimation; (b) modification of stego data aiming at disrupting the watermark detection and of resolving copyrights, taking into account the statistics of the embedded watermark and exploiting features of the human visual system. In the second part of the paper we propose a “second generation benchmark”. We follow the model of the Stirmark benchmark and propose the 6 following categories of tests: denoising attacks and wavelet compression, watermark copy attack, synchronization removal, denoising/compression followed by perceptual remodulation, denoising and random bending. Our results indicate that even though some algorithms perform well against the Stirmark benchmark, almost all algorithms perform poorly against our benchmark. This indicates that much work remains to be done before claims about “robust” watermarks can be made. We also propose a new method of evaluating image quality based on the Watson metric which overcomes the limitations of the PSNR.
doi_str_mv 10.1016/S0165-1684(01)00039-1
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_27016446</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0165168401000391</els_id><sourcerecordid>27016446</sourcerecordid><originalsourceid>FETCH-LOGICAL-c385t-69245313fbd10530964dc6f1e136eb1d02c11b5964bd29a3f1c3c7f169086f813</originalsourceid><addsrcrecordid>eNqFkE9LAzEQxYMoWKsfQdiT6GE1s9lkd71IqX-h4EE9h2wyW2PbTU1Si9_etBWvXmaY8JvJe4-QU6CXQEFcvaTCcxB1eU7hglLKmhz2yADqqsgrzqt9MvhDDslRCB8JAibogNyOYlR6li2cwfnc9tPrLLq18iZkKguoXW-yKfboVbSuz9Yqol8oP0tk1mKv3zfDMTno1DzgyW8fkrf7u9fxYz55fngajya5ZjWPuWiKkjNgXWuAckYbURotOsAkBVswtNAALU_PrSkaxTrQTFcdiIbWoquBDcnZ7u7Su88VhigXNuikW_XoVkEWVbJZliKBfAdq70Lw2Mmlt0nptwQqN5nJbWZyE4ikILeZyc0HN7s9TC6-LHoZtE0u0ViPOkrj7D8XfgCNxnLT</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>27016446</pqid></control><display><type>article</type><title>Attack modelling: towards a second generation watermarking benchmark</title><source>ScienceDirect Journals (5 years ago - present)</source><creator>Voloshynovskiy, S. ; Pereira, S. ; Iquise, V. ; Pun, T.</creator><creatorcontrib>Voloshynovskiy, S. ; Pereira, S. ; Iquise, V. ; Pun, T.</creatorcontrib><description>Digital image watermarking techniques for copyright protection have become increasingly robust. The best algorithms perform well against the now standard benchmark tests included in the Stirmark package. However the stirmark tests are limited since in general they do not properly model the watermarking process and consequently are limited in their potential to removing the best watermarks. Here we propose a stochastic formulation of watermarking attacks using an estimation-based concept. The proposed attacks consist of two main stages: (a) watermark or cover data estimation; (b) modification of stego data aiming at disrupting the watermark detection and of resolving copyrights, taking into account the statistics of the embedded watermark and exploiting features of the human visual system. In the second part of the paper we propose a “second generation benchmark”. We follow the model of the Stirmark benchmark and propose the 6 following categories of tests: denoising attacks and wavelet compression, watermark copy attack, synchronization removal, denoising/compression followed by perceptual remodulation, denoising and random bending. Our results indicate that even though some algorithms perform well against the Stirmark benchmark, almost all algorithms perform poorly against our benchmark. This indicates that much work remains to be done before claims about “robust” watermarks can be made. We also propose a new method of evaluating image quality based on the Watson metric which overcomes the limitations of the PSNR.</description><identifier>ISSN: 0165-1684</identifier><identifier>EISSN: 1872-7557</identifier><identifier>DOI: 10.1016/S0165-1684(01)00039-1</identifier><language>eng</language><publisher>Elsevier B.V</publisher><subject>Benchmarking: Stochastic image modeling ; Decoding ; Digital watermarking ; Estimation ; Watermarking attacks</subject><ispartof>Signal processing, 2001-06, Vol.81 (6), p.1177-1214</ispartof><rights>2001 Elsevier Science B.V.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c385t-69245313fbd10530964dc6f1e136eb1d02c11b5964bd29a3f1c3c7f169086f813</citedby><cites>FETCH-LOGICAL-c385t-69245313fbd10530964dc6f1e136eb1d02c11b5964bd29a3f1c3c7f169086f813</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/S0165-1684(01)00039-1$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,777,781,3537,27905,27906,45976</link.rule.ids></links><search><creatorcontrib>Voloshynovskiy, S.</creatorcontrib><creatorcontrib>Pereira, S.</creatorcontrib><creatorcontrib>Iquise, V.</creatorcontrib><creatorcontrib>Pun, T.</creatorcontrib><title>Attack modelling: towards a second generation watermarking benchmark</title><title>Signal processing</title><description>Digital image watermarking techniques for copyright protection have become increasingly robust. The best algorithms perform well against the now standard benchmark tests included in the Stirmark package. However the stirmark tests are limited since in general they do not properly model the watermarking process and consequently are limited in their potential to removing the best watermarks. Here we propose a stochastic formulation of watermarking attacks using an estimation-based concept. The proposed attacks consist of two main stages: (a) watermark or cover data estimation; (b) modification of stego data aiming at disrupting the watermark detection and of resolving copyrights, taking into account the statistics of the embedded watermark and exploiting features of the human visual system. In the second part of the paper we propose a “second generation benchmark”. We follow the model of the Stirmark benchmark and propose the 6 following categories of tests: denoising attacks and wavelet compression, watermark copy attack, synchronization removal, denoising/compression followed by perceptual remodulation, denoising and random bending. Our results indicate that even though some algorithms perform well against the Stirmark benchmark, almost all algorithms perform poorly against our benchmark. This indicates that much work remains to be done before claims about “robust” watermarks can be made. We also propose a new method of evaluating image quality based on the Watson metric which overcomes the limitations of the PSNR.</description><subject>Benchmarking: Stochastic image modeling</subject><subject>Decoding</subject><subject>Digital watermarking</subject><subject>Estimation</subject><subject>Watermarking attacks</subject><issn>0165-1684</issn><issn>1872-7557</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2001</creationdate><recordtype>article</recordtype><recordid>eNqFkE9LAzEQxYMoWKsfQdiT6GE1s9lkd71IqX-h4EE9h2wyW2PbTU1Si9_etBWvXmaY8JvJe4-QU6CXQEFcvaTCcxB1eU7hglLKmhz2yADqqsgrzqt9MvhDDslRCB8JAibogNyOYlR6li2cwfnc9tPrLLq18iZkKguoXW-yKfboVbSuz9Yqol8oP0tk1mKv3zfDMTno1DzgyW8fkrf7u9fxYz55fngajya5ZjWPuWiKkjNgXWuAckYbURotOsAkBVswtNAALU_PrSkaxTrQTFcdiIbWoquBDcnZ7u7Su88VhigXNuikW_XoVkEWVbJZliKBfAdq70Lw2Mmlt0nptwQqN5nJbWZyE4ikILeZyc0HN7s9TC6-LHoZtE0u0ViPOkrj7D8XfgCNxnLT</recordid><startdate>20010601</startdate><enddate>20010601</enddate><creator>Voloshynovskiy, S.</creator><creator>Pereira, S.</creator><creator>Iquise, V.</creator><creator>Pun, T.</creator><general>Elsevier B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>L7M</scope></search><sort><creationdate>20010601</creationdate><title>Attack modelling: towards a second generation watermarking benchmark</title><author>Voloshynovskiy, S. ; Pereira, S. ; Iquise, V. ; Pun, T.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c385t-69245313fbd10530964dc6f1e136eb1d02c11b5964bd29a3f1c3c7f169086f813</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2001</creationdate><topic>Benchmarking: Stochastic image modeling</topic><topic>Decoding</topic><topic>Digital watermarking</topic><topic>Estimation</topic><topic>Watermarking attacks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Voloshynovskiy, S.</creatorcontrib><creatorcontrib>Pereira, S.</creatorcontrib><creatorcontrib>Iquise, V.</creatorcontrib><creatorcontrib>Pun, T.</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>Advanced Technologies Database with Aerospace</collection><jtitle>Signal processing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Voloshynovskiy, S.</au><au>Pereira, S.</au><au>Iquise, V.</au><au>Pun, T.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Attack modelling: towards a second generation watermarking benchmark</atitle><jtitle>Signal processing</jtitle><date>2001-06-01</date><risdate>2001</risdate><volume>81</volume><issue>6</issue><spage>1177</spage><epage>1214</epage><pages>1177-1214</pages><issn>0165-1684</issn><eissn>1872-7557</eissn><abstract>Digital image watermarking techniques for copyright protection have become increasingly robust. The best algorithms perform well against the now standard benchmark tests included in the Stirmark package. However the stirmark tests are limited since in general they do not properly model the watermarking process and consequently are limited in their potential to removing the best watermarks. Here we propose a stochastic formulation of watermarking attacks using an estimation-based concept. The proposed attacks consist of two main stages: (a) watermark or cover data estimation; (b) modification of stego data aiming at disrupting the watermark detection and of resolving copyrights, taking into account the statistics of the embedded watermark and exploiting features of the human visual system. In the second part of the paper we propose a “second generation benchmark”. We follow the model of the Stirmark benchmark and propose the 6 following categories of tests: denoising attacks and wavelet compression, watermark copy attack, synchronization removal, denoising/compression followed by perceptual remodulation, denoising and random bending. Our results indicate that even though some algorithms perform well against the Stirmark benchmark, almost all algorithms perform poorly against our benchmark. This indicates that much work remains to be done before claims about “robust” watermarks can be made. We also propose a new method of evaluating image quality based on the Watson metric which overcomes the limitations of the PSNR.</abstract><pub>Elsevier B.V</pub><doi>10.1016/S0165-1684(01)00039-1</doi><tpages>38</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0165-1684
ispartof Signal processing, 2001-06, Vol.81 (6), p.1177-1214
issn 0165-1684
1872-7557
language eng
recordid cdi_proquest_miscellaneous_27016446
source ScienceDirect Journals (5 years ago - present)
subjects Benchmarking: Stochastic image modeling
Decoding
Digital watermarking
Estimation
Watermarking attacks
title Attack modelling: towards a second generation watermarking benchmark
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-20T16%3A29%3A16IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Attack%20modelling:%20towards%20a%20second%20generation%20watermarking%20benchmark&rft.jtitle=Signal%20processing&rft.au=Voloshynovskiy,%20S.&rft.date=2001-06-01&rft.volume=81&rft.issue=6&rft.spage=1177&rft.epage=1214&rft.pages=1177-1214&rft.issn=0165-1684&rft.eissn=1872-7557&rft_id=info:doi/10.1016/S0165-1684(01)00039-1&rft_dat=%3Cproquest_cross%3E27016446%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=27016446&rft_id=info:pmid/&rft_els_id=S0165168401000391&rfr_iscdi=true