一种基于奇异值分解的图像水印方案

Pegah Nikbakht, M. Mahdavi
{"title":"一种基于奇异值分解的图像水印方案","authors":"Pegah Nikbakht, M. Mahdavi","doi":"10.1109/IKT.2015.7288669","DOIUrl":null,"url":null,"abstract":"Digital watermarking is widely used to verify the authenticity or integrity of multimedia contents, such as images and videos. In the last few years, a well-known numerical tool called singular value decomposition (SVD) has received much attention from the watermarking community. Designers of SVD-based schemes usually use dewatermarking tools such as Stirmark to prove the robustness of their schemes. Although, these tools are valuable but their attacks usually reduce the quality of watermarked images. On the other hand, there is another group of attacks in which the attacker needs to know the watermarking algorithm to perform the attack. In this paper, an attack in this group has been designed to remove the watermark from a specific SVD-based watermarking scheme [1]. The attack tries to change the exact space where watermark has been embedded. The experiments show our attack makes fewer changes to remove embedded watermark than other distortions available in Stirmark, so the quality of attacked image is better than processed image by using Stirmark in terms of PSNR.","PeriodicalId":338953,"journal":{"name":"2015 7th Conference on Information and Knowledge Technology (IKT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Targeted watermark removal of a SVD-based image watermarking scheme\",\"authors\":\"Pegah Nikbakht, M. Mahdavi\",\"doi\":\"10.1109/IKT.2015.7288669\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Digital watermarking is widely used to verify the authenticity or integrity of multimedia contents, such as images and videos. In the last few years, a well-known numerical tool called singular value decomposition (SVD) has received much attention from the watermarking community. Designers of SVD-based schemes usually use dewatermarking tools such as Stirmark to prove the robustness of their schemes. Although, these tools are valuable but their attacks usually reduce the quality of watermarked images. On the other hand, there is another group of attacks in which the attacker needs to know the watermarking algorithm to perform the attack. In this paper, an attack in this group has been designed to remove the watermark from a specific SVD-based watermarking scheme [1]. The attack tries to change the exact space where watermark has been embedded. The experiments show our attack makes fewer changes to remove embedded watermark than other distortions available in Stirmark, so the quality of attacked image is better than processed image by using Stirmark in terms of PSNR.\",\"PeriodicalId\":338953,\"journal\":{\"name\":\"2015 7th Conference on Information and Knowledge Technology (IKT)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-05-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 7th Conference on Information and Knowledge Technology (IKT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IKT.2015.7288669\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 7th Conference on Information and Knowledge Technology (IKT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IKT.2015.7288669","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

摘要

数字水印被广泛用于验证图像和视频等多媒体内容的真实性或完整性。近年来,一种著名的数字工具奇异值分解(SVD)受到了水印界的广泛关注。基于奇异值分解方案的设计者通常使用诸如Stirmark之类的去水印工具来证明其方案的鲁棒性。虽然这些工具很有价值,但它们的攻击往往会降低水印图像的质量。另一方面,还有一类攻击,攻击者需要知道水印算法才能进行攻击。在本文中,我们设计了一种这种攻击来从特定的基于奇异值分解的水印方案中去除水印[1]。该攻击试图改变水印嵌入的确切空间。实验表明,我们的攻击比其他的Stirmark方法对去除嵌入水印的改变更少,因此在PSNR方面攻击图像的质量优于使用Stirmark方法处理后的图像。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Targeted watermark removal of a SVD-based image watermarking scheme
Digital watermarking is widely used to verify the authenticity or integrity of multimedia contents, such as images and videos. In the last few years, a well-known numerical tool called singular value decomposition (SVD) has received much attention from the watermarking community. Designers of SVD-based schemes usually use dewatermarking tools such as Stirmark to prove the robustness of their schemes. Although, these tools are valuable but their attacks usually reduce the quality of watermarked images. On the other hand, there is another group of attacks in which the attacker needs to know the watermarking algorithm to perform the attack. In this paper, an attack in this group has been designed to remove the watermark from a specific SVD-based watermarking scheme [1]. The attack tries to change the exact space where watermark has been embedded. The experiments show our attack makes fewer changes to remove embedded watermark than other distortions available in Stirmark, so the quality of attacked image is better than processed image by using Stirmark in terms of PSNR.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信