TITLE

Attacks on Digital Watermarked Images in the Internet Environment and Their Counter Measures

AUTHOR(S)
Bandyopadhyay, Tapas; Bandyopadhyay, B.; Chatterji, B. N.
PUB. DATE
March 2013
SOURCE
International Journal of Advanced Research in Computer Science;Mar/Apr2013, Vol. 4 Issue 2, p155
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Web application has made it faster and convenient to keep and transact important multimedia contents such as image through the Internet. Digital watermarking to the images can secure the information to a great extend to establish the authenticity of the owner of the images to protect copyright against unauthorized claiming of ownership of the image. Digital watermarking on the image is an effective technique for protection of ownership rights in the untrusted open internet environment. However, the success of a digital watermarking technology depends heavily on its robustness to withstand attacks that are aimed at removing or destroying the watermark from its host data (image artefact). This paper aims at to analyse a number of digital image watermark attacks that the watermarked image may face and attempt has been made to classify them into different categories. A set of experimental results are also provided to show the effect of these attacks on watermarked images in the internet environment.
ACCESSION #
91876846

 

Related Articles

  • A Two-Tier Protection Mechanism using Cryptography and Robust Watermarking and its Improvement using Arnold Transform on Images. Chugh, Sonal; Malik, Rajesh // International Journal of ElectroComputational World & Knowledge ;Oct2011, Vol. 1 Issue 2, p1 

    Exchange of large amount of multimedia data has become feasible with the explosive growth of internet technology. People can easily copy and modify the digital product which leads to the piracy problems which is spreading over the internet and thus poses a great threat to the ownership rights....

  • Content Based Image-in-Image Watermarking Using DCT and SVD. Tirumala, Ramashri; Reddy, Narayana S. // International Journal of Applied Engineering Research;2009, Vol. 4 Issue 2, p187 

    In this paper we consider content based features like texture, luminance, corners and the edges based attacks including JPEG compression, noise, filtering and rotation etc. Experimental results are evaluated with correlation and PSNR. Experimental results show that the proposed watermarking...

  • INTELLIGENT MODIFIED DIFFERENCE EXPANSION FOR REVERSIBLE WATERMARKING. Maity, Hirak Kumar; Maity, Santi Prasad // International Journal of Multimedia & Its Applications;Aug2012, Vol. 4 Issue 4, p83 

    Reversible Watermarking (RW) using Difference Expansion (DE) algorithm plays an important role on content authentication for highly secured medical and military images. According to this algorithm, the least significant bit (LSB) of inter-pixel differences (between a pair of neighboring pixel)...

  • A DWT based Dual Image Watermarking Technique for Authenticity and Watermark Protection. Tripathi, Shikha; Ramesh, Nishanth; Bernito, A.; Neeraj, K. J. // Signal & Image Processing: An International Journal;Dec2010, Vol. 1 Issue 2, p33 

    In this paper we propose a DWT based dual watermarking technique wherein both blind and non-blind algorithms are used for the copyright protection of the cover/host image and the watermark respectively. We use the concept of embedding two watermarks into the cover image by actually embedding...

  • Suggested Method for Estimating Maximum Capacity of Images for Different Intensities. Abbas, Thekra; Beiji, Zou; Fedha, Ongalo P. N. // International Journal of Computer Science Issues (IJCSI);Mar2013, Vol. 10 Issue 2, p73 

    Digital watermarking has been proposed as a viable solution to the need of copyright protection and authentication of multimedia data in a networked environment, since it makes possible to identify the author, owner, distributor or authorized consumer of a document. Watermarking payload is a...

  • Color Image Watermarking Scheme using DWT and DCT Coefficients of R, G and B Color Components. Eswaraiah, R.; Edara, Sai Alekhya; Reddy, E. Sreenivasa // International Journal of Computer Applications;7/15/2012, Vol. 50, p38 

    Digital image watermarking is the technology used to protect copy right information of multimedia objects. This paper presents a more secure method for copyright protection. In this scheme color image is decomposed into R, G, B channels and then DWT and DCT transformations are applied on these...

  • Contourlet versus Wavelet Transform for a Robust Digital Image Watermarking Technique. El rube, Ibrahim A.; El Nasr, Mohamad Abou; Naim, Mostafa M.; Farouk, Mahmoud // World Academy of Science, Engineering & Technology;Dec2009, Issue 36, p288 

    In this paper, a watermarking algorithm that uses the wavelet transform with Multiple Description Coding (MDC) and Quantization Index Modulation (QIM) concepts is introduced. Also, the paper investigates the role of Contourlet Transform (CT) versus Wavelet Transform (WT) in providing robust...

  • A Robust Image Watermarking Scheme Based Multiresolution Analysis. Mohananthini, N.; Yamuna, G. // International Journal of Image, Graphics & Signal Processing;Oct2012, Vol. 4 Issue 11, p9 

    Digital watermarking has been widely applied to solve copyright protection problems of digital media relating to illegal use of distributions. In digital watermarking, a watermark is embedded into a cover image in such way that the resulting watermarked signal is robust to certain distortion....

  • A Robust Zero-Watermarking Algorithm for Audio. Ning Chen; Jie Zhu // EURASIP Journal on Advances in Signal Processing;2008, p1 

    In traditional watermarking algorithms, the insertion of watermark into the host signal inevitably introduces some perceptible quality degradation. Another problem is the inherent conflict between imperceptibility and robustness. Zero-watermarking technique can solve these problems successfully....

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics