2001
DOI: 10.1117/12.435422
|View full text |Cite
|
Sign up to set email alerts
|

<title>Review on attacks, problems, and weaknesses of digital watermarking and the pixel reallocation attack</title>

Abstract: Watermark attacks are first categorized and explained with examples in this paper. We then propose a new image watermark attack called "Pixel Reallocation Attack". The proposed attack is a hybrid approach, which aims to decorrelate the embedded watermark with the original watermark. Since many watermarking detections are by correlating the testing image with the target watermark, it will not work once we decorrelate the embedded watermark. For example, the geometrical transformation attacks desynchronize the c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2006
2006
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 10 publications
(18 reference statements)
0
3
0
Order By: Relevance
“…Image watermarking is a common method of proving ownership or determining origin (Tsang & Au, 2001). Unintentionally destroyed watermarks happen when transmitting an image.…”
Section: Background Explanationmentioning
confidence: 99%
“…Image watermarking is a common method of proving ownership or determining origin (Tsang & Au, 2001). Unintentionally destroyed watermarks happen when transmitting an image.…”
Section: Background Explanationmentioning
confidence: 99%
“…The watermark cover is divided into blocks whose size is pixels. We define a block of as follows: (8) where are the indices of the block, are the coordinates of the displacement and represent the coordinates of an element of the block.…”
Section: ) Optical Flowmentioning
confidence: 99%
“…Until now, most of the proposed watermarking algorithms, derived from classical schemes such as [3]- [6], are mainly robust against usual image processing such as low-pass filtering or JPEG compression. However, most of them are still weak against geometrical distortions and malicious attacks [7], [8] (e.g., Stirmark [9], [10], collusion attacks, Dewatermarking Attack [11], etc.). It is quite easy to see that data payload, fidelity, and robustness are often in conflict.…”
Section: Introductionmentioning
confidence: 99%