Khalifa, Othman Omran and Yusof, Yusnita and Hassan Abdalla Hashim, Aisha and Olanrewaju, Rashidah Funke (2012) State-of-the-art digital watermarking attacks. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia, 3-5th July 2012, Seri Pacific Hotel Kuala Lumpur, Malaysia.
PDF (State-Of-The-Art Digital Watermarking Attacks)
- Published Version
Restricted to Registered users only Download (713kB) | Request a copy |
Abstract
Digital watermarking is a huge research area which is progressively growing. It covers theoretical studies, novel techniques, attacks and performance analysis. An embedded watermark may unintentionally or inadvertently be impaired by such processing. Other types of processing may be applied with the explicit goal of hindering watermark reception. In watermarking terminology, an “attack” is any processing that may impair detection of the watermark or communication of the information conveyed by the watermark. Broadly it can be classified as Intentional Attacks and Non-Intentional Attacks. The processed watermarked data is then called “attacked data”. An important aspect of any Watermarking scheme is its robustness against attacks. The notion of robustness is intuitively clear: A watermark is robust if it cannot be impaired without also rendering the attacked data useless. Watermark impairment can be measured by criteria such as miss probability, probability of bit error, or channel capacity. For multimedia, the usefulness of the attacked data can be gauged by considering its perceptual quality or distortion. Hence, robustness can be evaluated by simultaneously considering watermark impairment and the distortion of the attacked data. An attack succeeds in defeating a watermarking scheme if it impairs the watermark beyond acceptable limits while maintaining the perceptual quality of the attacked data. In this paper, JPEG compression (quality 50 and 75), noise (Gaussian noise), distortion (blurring) and contrast enhancement (histogram equalization and intensity adjustment) are testified. Results shown that embedding gain and DWT decomposition subbands were among the contribute against attacks performed
Item Type: | Conference or Workshop Item (UNSPECIFIED) |
---|---|
Additional Information: | 4119/24630 |
Uncontrolled Keywords: | Watermarking, Attacks, JPEG Compression |
Subjects: | Q Science > Q Science (General) |
Kulliyyahs/Centres/Divisions/Institutes (Can select more than one option. Press CONTROL button): | Kulliyyah of Engineering Kulliyyah of Engineering > Department of Electrical and Computer Engineering |
Depositing User: | Dr. Rashidah Funke Olanrewaju |
Date Deposited: | 17 Dec 2012 14:28 |
Last Modified: | 23 Oct 2020 12:11 |
URI: | http://irep.iium.edu.my/id/eprint/24630 |
Actions (login required)
View Item |