Loading…
EWA: An exemplar-based watermarking attack
In this paper, we used image inpainting as a means for reconstruction of small damaged portions of a watermarked image so that the hidden watermark is not detectable afterwards. Our new watermarking attack algorithm extends the exemplar-based inpainting method, and then we apply it to intended noisy...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 5 |
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Taherinia, A. H. Jamzad, M. |
description | In this paper, we used image inpainting as a means for reconstruction of small damaged portions of a watermarked image so that the hidden watermark is not detectable afterwards. Our new watermarking attack algorithm extends the exemplar-based inpainting method, and then we apply it to intended noisy watermarked images to alter the watermark detection process. Our approach is completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. The average PSNR/SSIM of the watermarked image after applying the proposed attack is more than 35/0.98 and the average NC for extracted watermark is lowers than 0.5, so theoretically, the watermark is not detectable. |
doi_str_mv | 10.1109/ICIMU.2011.6122766 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6122766</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6122766</ieee_id><sourcerecordid>6122766</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-23272ca9f78a679c4492d8fe685e854dc06afe9bb8c2ac7d7a129124f0addf723</originalsourceid><addsrcrecordid>eNo1j01Lw0AURUdEUGv-gG6yFhJnXibzZtyF0GqgpZuKy_Iy80ZiPyhJQP33Bqx3c7mbw7lC3CuZKyXdU1M3q7ccpFK5UQBozIW4VbpElM4iXIrEof3ftrgWyTB8yinGOHDqRjzO36vntDqm_M2H0576rKWBQ_pFI_cH6nfd8SOlcSS_uxNXkfYDJ-eeic1ivqlfs-X6pamrZdY5OWZQAIInF9GSQee1dhBsZGNLtqUOXhqK7NrWeiCPAUlNIqCjpBAiQjETD3_Yjpm3p76bLH6253fFL0rIQi4</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>EWA: An exemplar-based watermarking attack</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Taherinia, A. H. ; Jamzad, M.</creator><creatorcontrib>Taherinia, A. H. ; Jamzad, M.</creatorcontrib><description>In this paper, we used image inpainting as a means for reconstruction of small damaged portions of a watermarked image so that the hidden watermark is not detectable afterwards. Our new watermarking attack algorithm extends the exemplar-based inpainting method, and then we apply it to intended noisy watermarked images to alter the watermark detection process. Our approach is completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. The average PSNR/SSIM of the watermarked image after applying the proposed attack is more than 35/0.98 and the average NC for extracted watermark is lowers than 0.5, so theoretically, the watermark is not detectable.</description><identifier>ISBN: 9781457709883</identifier><identifier>ISBN: 1457709880</identifier><identifier>EISBN: 1457709872</identifier><identifier>EISBN: 9781457709876</identifier><identifier>EISBN: 9781457709890</identifier><identifier>EISBN: 1457709899</identifier><identifier>DOI: 10.1109/ICIMU.2011.6122766</identifier><language>eng</language><publisher>IEEE</publisher><subject>Benchmark testing ; Benchmarks ; Image edge detection ; Image inpainting ; Image segmentation ; PSNR ; Robustness ; Watermarking ; Watermarking attacks</subject><ispartof>ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia, 2011, p.1-5</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6122766$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6122766$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Taherinia, A. H.</creatorcontrib><creatorcontrib>Jamzad, M.</creatorcontrib><title>EWA: An exemplar-based watermarking attack</title><title>ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia</title><addtitle>ICIMU</addtitle><description>In this paper, we used image inpainting as a means for reconstruction of small damaged portions of a watermarked image so that the hidden watermark is not detectable afterwards. Our new watermarking attack algorithm extends the exemplar-based inpainting method, and then we apply it to intended noisy watermarked images to alter the watermark detection process. Our approach is completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. The average PSNR/SSIM of the watermarked image after applying the proposed attack is more than 35/0.98 and the average NC for extracted watermark is lowers than 0.5, so theoretically, the watermark is not detectable.</description><subject>Benchmark testing</subject><subject>Benchmarks</subject><subject>Image edge detection</subject><subject>Image inpainting</subject><subject>Image segmentation</subject><subject>PSNR</subject><subject>Robustness</subject><subject>Watermarking</subject><subject>Watermarking attacks</subject><isbn>9781457709883</isbn><isbn>1457709880</isbn><isbn>1457709872</isbn><isbn>9781457709876</isbn><isbn>9781457709890</isbn><isbn>1457709899</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNo1j01Lw0AURUdEUGv-gG6yFhJnXibzZtyF0GqgpZuKy_Iy80ZiPyhJQP33Bqx3c7mbw7lC3CuZKyXdU1M3q7ccpFK5UQBozIW4VbpElM4iXIrEof3ftrgWyTB8yinGOHDqRjzO36vntDqm_M2H0576rKWBQ_pFI_cH6nfd8SOlcSS_uxNXkfYDJ-eeic1ivqlfs-X6pamrZdY5OWZQAIInF9GSQee1dhBsZGNLtqUOXhqK7NrWeiCPAUlNIqCjpBAiQjETD3_Yjpm3p76bLH6253fFL0rIQi4</recordid><startdate>201111</startdate><enddate>201111</enddate><creator>Taherinia, A. H.</creator><creator>Jamzad, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201111</creationdate><title>EWA: An exemplar-based watermarking attack</title><author>Taherinia, A. H. ; Jamzad, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-23272ca9f78a679c4492d8fe685e854dc06afe9bb8c2ac7d7a129124f0addf723</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Benchmark testing</topic><topic>Benchmarks</topic><topic>Image edge detection</topic><topic>Image inpainting</topic><topic>Image segmentation</topic><topic>PSNR</topic><topic>Robustness</topic><topic>Watermarking</topic><topic>Watermarking attacks</topic><toplevel>online_resources</toplevel><creatorcontrib>Taherinia, A. H.</creatorcontrib><creatorcontrib>Jamzad, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Taherinia, A. H.</au><au>Jamzad, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>EWA: An exemplar-based watermarking attack</atitle><btitle>ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia</btitle><stitle>ICIMU</stitle><date>2011-11</date><risdate>2011</risdate><spage>1</spage><epage>5</epage><pages>1-5</pages><isbn>9781457709883</isbn><isbn>1457709880</isbn><eisbn>1457709872</eisbn><eisbn>9781457709876</eisbn><eisbn>9781457709890</eisbn><eisbn>1457709899</eisbn><abstract>In this paper, we used image inpainting as a means for reconstruction of small damaged portions of a watermarked image so that the hidden watermark is not detectable afterwards. Our new watermarking attack algorithm extends the exemplar-based inpainting method, and then we apply it to intended noisy watermarked images to alter the watermark detection process. Our approach is completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. The average PSNR/SSIM of the watermarked image after applying the proposed attack is more than 35/0.98 and the average NC for extracted watermark is lowers than 0.5, so theoretically, the watermark is not detectable.</abstract><pub>IEEE</pub><doi>10.1109/ICIMU.2011.6122766</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781457709883 |
ispartof | ICIMU 2011 : Proceedings of the 5th international Conference on Information Technology & Multimedia, 2011, p.1-5 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6122766 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Benchmark testing Benchmarks Image edge detection Image inpainting Image segmentation PSNR Robustness Watermarking Watermarking attacks |
title | EWA: An exemplar-based watermarking attack |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T18%3A50%3A34IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=EWA:%20An%20exemplar-based%20watermarking%20attack&rft.btitle=ICIMU%202011%20:%20Proceedings%20of%20the%205th%20international%20Conference%20on%20Information%20Technology%20&%20Multimedia&rft.au=Taherinia,%20A.%20H.&rft.date=2011-11&rft.spage=1&rft.epage=5&rft.pages=1-5&rft.isbn=9781457709883&rft.isbn_list=1457709880&rft_id=info:doi/10.1109/ICIMU.2011.6122766&rft.eisbn=1457709872&rft.eisbn_list=9781457709876&rft.eisbn_list=9781457709890&rft.eisbn_list=1457709899&rft_dat=%3Cieee_6IE%3E6122766%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-23272ca9f78a679c4492d8fe685e854dc06afe9bb8c2ac7d7a129124f0addf723%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6122766&rfr_iscdi=true |