Proceedings of the 11th ACM Workshop on Multimedia and Security 2009
DOI: 10.1145/1597817.1597819
|View full text |Cite
|
Sign up to set email alerts
|

Two key estimation techniques for the broken arrows watermarking scheme

Abstract: This paper presents two different key estimation attacks targeted for the image watermarking system proposed for the BOWS-2 contest. Ten thousands images are used in order to estimate the secret key and remove the watermark while minimizing the distortion. Two different techniques are proposed. The first one combines a regression-based denoising process to filter out the component of the original images and a clustering algorithm to compute the different components of the key. The second attack is based on an … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 17 publications
(19 citation statements)
references
References 17 publications
0
19
0
Order By: Relevance
“…This confirms Patrick Bas' results. 4 However, for BA and AWC embedding techniques with the regulated parameters N v = 1024 and N c = 256, SCD norm is always close to 1, this shows that the OPAST algorithm cannot estimate the secret subspace any longer.…”
Section: Security Evaluations Against Attacksmentioning
confidence: 97%
See 2 more Smart Citations
“…This confirms Patrick Bas' results. 4 However, for BA and AWC embedding techniques with the regulated parameters N v = 1024 and N c = 256, SCD norm is always close to 1, this shows that the OPAST algorithm cannot estimate the secret subspace any longer.…”
Section: Security Evaluations Against Attacksmentioning
confidence: 97%
“…4 We sum up its main process here: 1) Through a huge number of observations, the fast and efficient OPAST algorithm estimates the projection matrix W, whose size is N s × N p , here N s is the number of the wavelet coefficients to be watermarked and N p represents the number of principal components. In order to assess the performance of his subspace estimation algorithm, he used the Square Chordal Distance (SCD) between the secret subspace span(S C ) and the estimated subspace span(Ŵ) during this step.…”
Section: Bas Subspace Estimation Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…We could model the cover sample from other, but temporally close stego samples: A similar approach was used during the BOWS-2 contest to estimate the unmarked magnitude of wavelet coefficients from its surrounding [13]. This has been successful, because the piece of watermark in s i was independent of the watermark in the samples of the surrounding.…”
Section: Saturn Sightedmentioning
confidence: 99%
“…The embedding is considerably modifying the power distribution of the signal in the secret subspace. With OPAST, an available implementation of the Principal Component Analysis (PCA), the authors of [3] succeeded to disclose the secret space of the original version of Broken Arrows, pointing out a lack of security. In a recent paper, we proposed a counter-measure to this attack [15].…”
Section: Introductionmentioning
confidence: 99%