Loading...
Search for: watermarking
0.006 seconds
Total 109 records

    EWA: An exemplar-based watermarking attack

    , Article 2011 International Conference on Information Technology and Multimedia: "Ubiquitous ICT for Sustainable and Green Living", ICIM 2011, 14 November 2011 through 16 November 2011 ; Nov , 2011 , Page(s): 1 - 5 ; 9781457709890 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    In this paper, we used image inpainting as a means for reconstruction of small damaged portions of a watermarked image so that the hidden watermark is not detectable afterwards. Our new watermarking attack algorithm extends the exemplar-based inpainting method, and then we apply it to intended noisy watermarked images to alter the watermark detection process. Our approach is completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. The average PSNR/SSIM of the watermarked image after applying the proposed attack is more than 35/0.98 and the average NC for extracted watermark is lowers than 0.5, so... 

    A new watermarking attack based on content-aware image resizing

    , Article 2009 International Multimedia, Signal Processing and Communication Technologies, IMPACT 2009, Aligarh, 14 March 2009 through 16 March 2009 ; 2009 , Pages 177-180 ; 9781424436040 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper, we propose a new method for damaging and destroying robust invisible watermarks using an image resizing technique which is named seam carving. By using this method we are able to resize watermarked images in a content-aware manner so that the synchronization of the embedder and extractor of watermarking system is broken and the watermark detection becomes impossible. In contrast to the available benchmarks like Stirmark, proposed attack does not severely reduce the quality of the watermarked image. Therefore it maintains the commercial value of the watermarked image. We have tested the proposed method to attack 3 recent and robust watermarking methods and the results sound... 

    Framework for robust blind image watermarking based on classification of attacks

    , Article Multimedia Tools and Applications ; 2016 , Pages 1-21 ; 13807501 (ISSN) Heidari, M ; Samavi, S ; Soroushmehr, S. M. R ; Shirani, S ; Karimi, N ; Najarian, K ; Sharif University of Technology
    Springer New York LLC  2016
    Abstract
    With the widespread internet usage, digital contents are easily distributed throughout the world. To eliminate concerns of producers and owners of digital contents, watermarking techniques are extensively being used. Robustness against intentional and unintentional attacks is a major quality of watermarking systems. Since different attacks tend to target different parts of the frequency spectrum, in this paper we propose a framework for blind watermarking which determines the type of attack that the image has gone through before extracting the watermark. Within this framework, we propose an attack classification method to identify the region of the frequency spectrum that is less damaged.... 

    Framework for robust blind image watermarking based on classification of attacks

    , Article Multimedia Tools and Applications ; Volume 76, Issue 22 , 2017 , Pages 23459-23479 ; 13807501 (ISSN) Heidari, M ; Samavi, S ; Soroushmehr, S. M. R ; Shirani, S ; Karimi, N ; Najarian, K ; Sharif University of Technology
    Abstract
    With the widespread internet usage, digital contents are easily distributed throughout the world. To eliminate concerns of producers and owners of digital contents, watermarking techniques are extensively being used. Robustness against intentional and unintentional attacks is a major quality of watermarking systems. Since different attacks tend to target different parts of the frequency spectrum, in this paper we propose a framework for blind watermarking which determines the type of attack that the image has gone through before extracting the watermark. Within this framework, we propose an attack classification method to identify the region of the frequency spectrum that is less damaged.... 

    Improvement to a semi-fragile watermarking scheme against a proposed counterfeiting attack

    , Article 11th International Conference on Advanced Communication Technology, ICACT 2009, Phoenix Park, 15 February 2009 through 18 February 2009 ; Volume 3 , 2009 , Pages 1928-1932 ; 17389445 (ISSN); 9788955191387 (ISBN) Kourkchi, H ; Ghaemmaghami, S ; Sharif University of Technology
    2009
    Abstract
    One of the main properties of digital watermarking methods is their security against attacks. In this paper, a novel attack against an adaptive semi-fragile image watermarking is proposed. In this attack, watermarking key and watermark are estimated by using several watermarked images. In order to improve the watermarking scheme against the proposed attack, the entropy of image blocks is utilized. Using entropy is compatible with Human Visual System (HVS); therefore it is suitable to determine the weight of watermark in image blocks. Since entropy is a sensitive feature, it is used to improve the watermarking method performance against the proposed attack. It is shown that this modification... 

    Improving the performance of spatial domain image watermarking with high boost filter

    , Article Indian Journal of Science and Technology ; Vol. 7, issue. 12 , Dec , 2014 , p. 2133-2139 Alirezanejad, M ; Amirgholipour, S ; Safari, V ; Aslani, S ; Arab, M ; Sharif University of Technology
    Abstract
    Authenticating in transaction of digital media becomes an active research field now a day. That is emerging due to the illegal use of digital media and hacking by unauthorized users. Spatial domain based watermarking methods are one of the authentication methods. These methods are not generally robust against intentional or unintentional changes in the images. In this paper, a new method is proposed to recover watermark more precisely in the spatial domain watermarking method. A high-boost filtering is utilized before executing watermark extraction procedure. The watermark information is magnified by preforming this filter. Effectiveness of this filter is proved by several experiment.... 

    Blind dewatermarking method based on wavelet transform

    , Article Optical Engineering ; Volume 50, Issue 5 , 2011 ; 00913286 (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    Along with the improvement of image watermarking techniques, the necessity for effectively and comprehensively evaluating various algorithms becomes imperative. In this paper, we first propose a new categorization that fits for most of the existing watermarking algorithms that work in the wavelet domain. Then an adaptive watermarking attack for evaluating the robustness of watermarking schemes that are based on the proposed categorization is presented. This attack determines the flat regions, edges, and textures of the watermarked image and based on known features of each region the proposed attack tries to destroy the watermark information. This is done by separately manipulating the... 

    A two-step watermarking attack using long-range correlation image restoration

    , Article Security and Communication Networks ; Volume 5, Issue 6 , AUG , 2012 , Pages 625-635 ; 19390122 (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2012
    Abstract
    This paper presents an efficient scheme for blind watermark attacking using the concept of matching of the long-range data. The main idea of the proposed attack is to add plenty of noise to the watermarked image and then try to restore an unwatermarked copy of the noisy image. The aim is to destroy the watermark information without accessing the parameters used during the watermark embedding process. So, it allows our approach to be completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. Experimental results show the proposed algorithm's superiority over several other traditional watermarking... 

    A new adaptive watermarking attack in wavelet domain

    , Article 2009 International Multimedia, Signal Processing and Communication Technologies, IMPACT 2009, Aligarh, 14 March 2009 through 16 March 2009 ; 2009 , Pages 320-323 ; 9781424436040 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper, we proposed a categorization for most of the existing watermarking algorithms that work in wavelet domain. Then an adaptive watermarking attack for digital images that is based on the proposed categorization is presented. This attack determines the flat regions, edges and textures of the watermarked image and based on known features of each region the proposed attack tries to destroy the watermark information by manipulating the wavelet coefficients of each region separately such that the least visual distortion will be imposed on the attacked image. We have tested the proposed method to attack two recent and robust watermarking methods and the results sound impressive. The... 

    A robust zero-watermarking scheme using Canny edge detector

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 5, Issue 1 , 2013 , Pages 25-44 ; 1751911X (ISSN) Shakeri, M ; Jamzad, M ; Sharif University of Technology
    2013
    Abstract
    By expansion of digital multimedia and networking technology, the problem of ownership protection has become increasingly important. Digital watermarking is an efficient way for copyright protection of digital images. Traditional watermarking techniques degrade the quality of host image by embedding a watermark logo. Facing this problem, a new watermarking approach called zero-watermarking has been proposed. In zero-watermarking methods, the watermark does not require to be embedded into the protected image but it uses both the watermark and the protected image to generate a verification map which is registered to a trusted authority for further protection. In this paper we propose a robust... 

    Two novel chaos-based algorithms for image and video watermarking

    , Article Iranian Journal of Electrical and Electronic Engineering ; Volume 8, Issue 2 , 2012 , Pages 97-107 ; 17352827 (ISSN) Mohammadi, S ; Talebi, S ; Hakimi, A ; Sharif University of Technology
    IJEEE  2012
    Abstract
    In this paper we introduce two innovative image and video watermarking algorithms. The paper's main emphasis is on the use of chaotic maps to boost the algorithms' security and resistance against attacks. By encrypting the watermark information in a one dimensional chaotic map, we make the extraction of watermark for potential attackers very hard. In another approach, we select embedding positions by a two dimensional chaotic map which enables us to satisfactorily distribute watermark information throughout the host signal. This prevents concentration of watermark data in a corner of the host signal which effectively saves it from being a target for attacks that include cropping of the... 

    An algorithm for modeling print and scan operations used for watermarking

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10 November 2008 through 12 November 2008 ; Volume 5450 LNCS , 2009 , Pages 254-265 ; 03029743 (ISSN) ; 3642044379 (ISBN); 9783642044373 (ISBN) Amiri, S.H ; Jamzad, M ; Sharif University of Technology
    Abstract
    Watermarking is a suitable approach for digital image authentication. Robustness regarding attacks that aim to remove the watermark is one of the most important challenges in watermarking, in general. Several different attacks are reported that aim to make it difficult or impossible for the real owner of the digital watermarked image to extract the watermark. Some of such common attacks are noise addition, compression, scaling, rotation, clipping, cropping, etc. In this paper we address the issue of print and scan attack by introducing a method to model the scanner and printer. Then we will simulate the print and scan attack on the digital images to evaluate its robustness. In addition, we... 

    Increasing robustness of one bit embedding spread spectrum audio watermarking against malicious attack

    , Article Proceedings of the IASTED International Conference on Circuits, Signals, and Systems, Clearwater Beach, FL, 28 November 2004 through 1 December 2004 ; 2004 , Pages 69-73 ; 0889864551 (ISBN); 9780889864559 (ISBN) Erfani, Y ; Ghaemmaghami, S ; IASTED ; Sharif University of Technology
    2004
    Abstract
    In this paper, we change the correlation detector at receiver of spread spectrum (SS) audio watermarking to present a mechanism that prevents the system against malicious attack. The receiver of typical SS-based watermarking can only detect the watermark bit, while a pirate can send a pure signal that may incorrectly be detected as a watermarked signal. In our system we consider all conditions that we may have in SS-based watermarking system. By computing a threshold, we can detect watermark in any of two cases of having watermarked signal or pure original signal at the receiver. We reduce false alarm probability to approximately zero in our system. This mechanism, as compared to SS, comes... 

    Distribution of watermark according to image complexity for higher stability

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 3212 , 2004 , Pages 794-801 ; 03029743 (ISSN); 3540232400 (ISBN); 9783540232407 (ISBN) Jamzad, M ; Yaghmaee, F ; Sharif University of Technology
    Springer Verlag  2004
    Abstract
    One of the main objectives of all watermarking algorithms is to provide a secure method for detecting all or part of the watermark pattern in case of usual attacks to a watermarked image. In this paper we introduce a method that is suitable for any spatial domain watermarking algorithms, such that, it can provide a measure for the level of robustness when a given watermark is supposed to be embedded in a known host image. In order to increase the robustness of the watermarked image, for a watermark of n bits, we embed it s times. Doing this, the entire image is divided into 16 equal size blocks. For each block the complexity of the sub-image in that block is measured. The number of... 

    A new blind energy based DWT-SVD domain watermarking using error control coding

    , Article International Journal of Knowledge-Based and Intelligent Engineering Systems ; Volume 19, Issue 2 , 2015 , Pages 135-141 ; 13272314 (ISSN) Tahzibi, M ; Sahebjamiyan, M ; Shahbahrami, A ; Sharif University of Technology
    IOS Press  2015
    Abstract
    The growth of data communication networks has made digital watermarking an important issue for copyright and content protection. Achieving high level of robustness and good transparency are the main objectives of developing every digital watermarking algorithm. From among transform domains as the basis of watermark hiding place, Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) are the most commonly used transforms in literature. In this paper we propose a new hybrid DWT-SVD domain watermarking scheme taking into account the energy content of every chosen block of the selected DWT sub-band coefficients. Before embedding, we append a... 

    A hybrid DCT-SVD based image watermarking algorithm

    , Article 24th Iranian Conference on Electrical Engineering, ICEE 2016, 10 May 2016 through 12 May 2016 ; 2016 , Pages 838-843 ; 9781467387897 (ISBN) Heidari, M ; Karimi, N ; Samavi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Everyday, people share their digital media on the virtual networks; therefore, protecting them against piracy is worthy of consideration. Digital watermarking is a method to achieve this goal. In this paper, we propose a watermarking method in Discrete Cosine Transform (DCT) domain. For this purpose, DCT coefficients of the whole image are calculated. It helps to present a system without blockiness effects. Then, singular values of the watermark image are added to the low frequency DCT coefficients of cover image that are located on the main diagonal. We use scaling factors for watermark embedding to improve imperceptibility of the watermark. A vector of fixed elements, which is calculated... 

    A new method for using a psychoacoustic model with patchwork audio watermarking in DFT domain

    , Article 34th Annual Conference of the IEEE Industrial Electronics Society, IECON 2008, Orlando, FL, 10 November 2008 through 13 November 2008 ; 2008 , Pages 1822-1827 ; 9781424417667 (ISBN) Tavakoli, E ; Tabandeh, M ; Sharif University of Technology
    IEEE Computer Society  2008
    Abstract
    This paper presents a novel patchwork audio watermarking scheme with a psychoacoustic model of HAS in DFT domain that has significantly higher detection robustness compared to standard and modified patchwork watermarking algorithms. In addition, watermark is perceptually tuned, so that its embedding is transparent. The proposed algorithm can be used for transmitting hidden data through telephone channel. Experimental results show that the proposed watermarking algorithm is sustainable against compression algorithms such as MP3, LPF, resampling, requantization and AWGN attacks. © 2008 IEEE  

    Robust multiplicative patchwork method for audio watermarking

    , Article IEEE Transactions on Audio, Speech and Language Processing ; Volume 17, Issue 6 , 2009 , Pages 1133-1141 ; 15587916 (ISSN) Khademi Kalantari, N ; Akhaee, M. A ; Ahadi, M ; Amindavar, H ; Sharif University of Technology
    2009
    Abstract
    This paper presents a Multiplicative Patchwork Method (MPM) for audio watermarking. The watermark signal is embedded by selecting two subsets of the host signal features and modifying one subset multiplicatively regarding the watermark data, whereas another subset is left unchanged. The method is implemented in wavelet domain and approximation coefficients are used to embed data. In order to have an error-free detection, the watermark data is inserted only in the frames where the ratio of the energy of subsets is between two predefined values. Also in order to control the inaudibility of watermark insertion, we use an iterative algorithm to reach a desired quality for the watermarked audio... 

    New Generation of On-purpose Attacks for Evaluating Digital Image Watermarking Methods by Preserving the Image Quality

    , Ph.D. Dissertation Sharif University of Technology Taherinia, Amir Hossein (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    Up to now, compared with the comprehensive research for developing robust watermarking algorithms, no equal attention has been devoted to the proposition of benchmarks tailored to assess the watermark robustness. In addition, almost all the state of the art benchmarks only integrate a number of common image processing operations like geometrical transformations to remove watermarks. However, the quality of the processed image is often too degraded to permit further commercial exploitation. Moreover, to the best of our knowledge, the design of these tools does not take into account the statistical properties of the images and watermarks in the design of attacks. In spite of the significant... 

    A new watermarking algorithm based on human visual system for content integrity verification of region of interest

    , Article Computing and Informatics ; Volume 31, Issue 4 , 2012 , Pages 877-899 ; 13359150 (ISSN) Fatemizadeh, E ; Maneshi, M ; Sharif University of Technology
    2012
    Abstract
    This paper proposes a semi-fragile, robust-to-JPEG2000 compression watermarking method which is based on the Human Visual System (HVS). This method is designed to verify the content integrity of Region of Interest (ROI) in tele-radiology images. The design of watermarking systems based on HVS leads to the possibility of embedding watermarks in places that are not obvious to the human eye. In this way, notwithstanding increased capacity and robustness, it becomes possible to hide more watermarks. Based on perceptual model of HVS, we propose a new watermarking scheme that embeds the watermarks using a replacement method. Thus, the proposed method not only detects the watermarks but also...