Review on attacks, problems, and weaknesses of digital watermarking and the pixel reallocation attack

  title={Review on attacks, problems, and weaknesses of digital watermarking and the pixel reallocation attack},
  author={Kai Fung Tsang and Oscar C. Au},
  booktitle={IS\&T/SPIE Electronic Imaging},
  • K. F. TsangO. Au
  • Published in IS&T/SPIE Electronic Imaging 1 August 2001
  • Computer Science
Watermark attacks are first categorized and explained with examples in this paper. We then propose a new image watermark attack called 'Pixel Reallocation Attack'. The proposed attack is a hybrid approach, which aims to decorrelate the embedded watermark with the original watermark. Since many watermarking detections are by correlating the testing image with the target watermark, it will not work once we decorrelate the embedded watermark. For example, the geometrical transformation attacks… 

A Review On Digital Image Watermarking With Cryptosystem Techniques

The methods which are able to control different levels of noise and produce high image quality, as well as provide security are considered to be the best algorithm in digital image watermarking.

Toward generic image dewatermarking?

An original attack based on self similarities is presented which should succeed in removing whatever watermarks have been inserted by whatever watermarking tools.

Robustness of Modified Non-Separable HaarWavelet Transform and Singular Value Decomposition for Non-blind Digital Image Watermarking

This paper introduces a non-blind digital watermarking scheme using modified non-separable Haar wavelet transform (NSHWT), singular value decomposition (SVD), Arnold's cat map, and Rabin-p cryptosystem to embed a binary watermark image into a color cover image.

Rotation Invariance in 2D-FRFT with Application to Digital Image Watermarking

The proposed method is robust against numerous watermarking attacks including rotation geometrical transform, JPEG compression, crop, median filtering, histogram equalization, salt & pepper noise, Gaussian lowpass filter, shift, dithering and Gaussian noise, and secures against unauthorized information copying and redistribution.

Still-image watermarking robust to local geometric distortions

This paper proposes an original blind watermarking algorithm robust to local geometrical distortions such as the deformations induced by Stirmark using a modified basic optical flow algorithm.

Identigram/watermark removal using cross-channel correlation

We introduce a method to repair an image which has been stamped by an identigram or a watermark. Our method is based on the cross-channel correlation which assures the co-occurrence of image

On the Implementation of a Digital Image Watermarking Framework Using Saliency and Phase Congruency

A saliency and phase congruency based digital image watermarking scheme has been projected and the model gives a concept of the areas which has excellent data hiding capacity within an image.

Robust Watermarking Framework for High Dynamic Range Images Against Tone-Mapping Attacks

This work has proposed a method to recover the single high dynamic range radiance map from multiple images with different exposure times, this method has been implemented in many HDR software.



Watermark copy attack

A conceptually new attack for digitally watermarked images that does not destroy an embedded watermark, but copies it from one image to a different image, and creates new challenges when watermarks are used for copyright protection and identification.

Spread spectrum watermarking: malicious attacks and counterattacks

This paper reviews proposed attacks on spread spectrum watermarks are systematically, and modifications for watermark embedding and extraction are presented to avoid and counterattack these attacks.

Secure spread spectrum watermarking for multimedia

It is argued that insertion of a watermark under this regime makes the watermark robust to signal processing operations and common geometric transformations provided that the original image is available and that it can be successfully registered against the transformed watermarked image.

Watermark estimation through detector analysis

A watermark is a perceptually unobtrusive signal embedded in an image, an audio or video clip, or any other other multimedia asset. Its purpose is to be a label which is holographically attached to

Robust audio watermarking using perceptual masking

Attack operators for digitally watermarked images

Experiments are reported in which the performance under malicious attack of discrete cosine transform-based digital watermarking has been investigated and the Laplacian removal operator proved to be particularly effective.

Some general methods for tampering with watermarks

To what extent a watermark can be resistant to tampering is discussed and a variety of possible attacks are described.

Rotation, scale and translation invariant digital image watermarking

It is proposed that Fourier-Mellin transform-based invariants can be used for digital image watermarking and may be designed to be unaffected by any combination of rotation, scale and translation transformations.

Resolving rightful ownerships with invisible watermarking techniques: limitations, attacks, and implications

It is shown that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone, and existing techniques are attacked by providing counterfeit water marking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership.

Adaptive Audio Watermarking Scheme for Copyright Protection