State-of-the-art digital watermarking attacks

Digital watermarking is a huge research area which is progressively growing. It covers theoretical studies, novel techniques, attacks and performance analysis. An embedded watermark may unintentionally or inadvertently be impaired by such processing. Other types of processing may be applied with...

Full description

Bibliographic Details
Main Authors: Khalifa, Othman Omran, Yusof, Yusnita, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke
Format: Proceeding Paper
Language:English
Published: 2012
Subjects:
Online Access:http://irep.iium.edu.my/24630/
http://irep.iium.edu.my/24630/1/1376C.pdf
_version_ 1848779335270400000
author Khalifa, Othman Omran
Yusof, Yusnita
Hassan Abdalla Hashim, Aisha
Olanrewaju, Rashidah Funke
author_facet Khalifa, Othman Omran
Yusof, Yusnita
Hassan Abdalla Hashim, Aisha
Olanrewaju, Rashidah Funke
author_sort Khalifa, Othman Omran
building IIUM Repository
collection Online Access
description Digital watermarking is a huge research area which is progressively growing. It covers theoretical studies, novel techniques, attacks and performance analysis. An embedded watermark may unintentionally or inadvertently be impaired by such processing. Other types of processing may be applied with the explicit goal of hindering watermark reception. In watermarking terminology, an “attack” is any processing that may impair detection of the watermark or communication of the information conveyed by the watermark. Broadly it can be classified as Intentional Attacks and Non-Intentional Attacks. The processed watermarked data is then called “attacked data”. An important aspect of any Watermarking scheme is its robustness against attacks. The notion of robustness is intuitively clear: A watermark is robust if it cannot be impaired without also rendering the attacked data useless. Watermark impairment can be measured by criteria such as miss probability, probability of bit error, or channel capacity. For multimedia, the usefulness of the attacked data can be gauged by considering its perceptual quality or distortion. Hence, robustness can be evaluated by simultaneously considering watermark impairment and the distortion of the attacked data. An attack succeeds in defeating a watermarking scheme if it impairs the watermark beyond acceptable limits while maintaining the perceptual quality of the attacked data. In this paper, JPEG compression (quality 50 and 75), noise (Gaussian noise), distortion (blurring) and contrast enhancement (histogram equalization and intensity adjustment) are testified. Results shown that embedding gain and DWT decomposition subbands were among the contribute against attacks performed
first_indexed 2025-11-14T15:16:08Z
format Proceeding Paper
id iium-24630
institution International Islamic University Malaysia
institution_category Local University
language English
last_indexed 2025-11-14T15:16:08Z
publishDate 2012
recordtype eprints
repository_type Digital Repository
spelling iium-246302020-10-23T04:11:39Z http://irep.iium.edu.my/24630/ State-of-the-art digital watermarking attacks Khalifa, Othman Omran Yusof, Yusnita Hassan Abdalla Hashim, Aisha Olanrewaju, Rashidah Funke Q Science (General) Digital watermarking is a huge research area which is progressively growing. It covers theoretical studies, novel techniques, attacks and performance analysis. An embedded watermark may unintentionally or inadvertently be impaired by such processing. Other types of processing may be applied with the explicit goal of hindering watermark reception. In watermarking terminology, an “attack” is any processing that may impair detection of the watermark or communication of the information conveyed by the watermark. Broadly it can be classified as Intentional Attacks and Non-Intentional Attacks. The processed watermarked data is then called “attacked data”. An important aspect of any Watermarking scheme is its robustness against attacks. The notion of robustness is intuitively clear: A watermark is robust if it cannot be impaired without also rendering the attacked data useless. Watermark impairment can be measured by criteria such as miss probability, probability of bit error, or channel capacity. For multimedia, the usefulness of the attacked data can be gauged by considering its perceptual quality or distortion. Hence, robustness can be evaluated by simultaneously considering watermark impairment and the distortion of the attacked data. An attack succeeds in defeating a watermarking scheme if it impairs the watermark beyond acceptable limits while maintaining the perceptual quality of the attacked data. In this paper, JPEG compression (quality 50 and 75), noise (Gaussian noise), distortion (blurring) and contrast enhancement (histogram equalization and intensity adjustment) are testified. Results shown that embedding gain and DWT decomposition subbands were among the contribute against attacks performed 2012-07-03 Proceeding Paper PeerReviewed application/pdf en http://irep.iium.edu.my/24630/1/1376C.pdf Khalifa, Othman Omran and Yusof, Yusnita and Hassan Abdalla Hashim, Aisha and Olanrewaju, Rashidah Funke (2012) State-of-the-art digital watermarking attacks. In: International Conference on Computer and Communication Engineering (ICCCE 2012), 3-5 July 2012, Kuala Lumpur, Malaysia, 3-5th July 2012, Seri Pacific Hotel Kuala Lumpur, Malaysia.
spellingShingle Q Science (General)
Khalifa, Othman Omran
Yusof, Yusnita
Hassan Abdalla Hashim, Aisha
Olanrewaju, Rashidah Funke
State-of-the-art digital watermarking attacks
title State-of-the-art digital watermarking attacks
title_full State-of-the-art digital watermarking attacks
title_fullStr State-of-the-art digital watermarking attacks
title_full_unstemmed State-of-the-art digital watermarking attacks
title_short State-of-the-art digital watermarking attacks
title_sort state-of-the-art digital watermarking attacks
topic Q Science (General)
url http://irep.iium.edu.my/24630/
http://irep.iium.edu.my/24630/1/1376C.pdf