Two Key Estimation Techniques for the Broken-Arrows Watermarking Scheme - C2S Accéder directement au contenu
Communication Dans Un Congrès Année : 2009

Two Key Estimation Techniques for the Broken-Arrows Watermarking Scheme

Résumé

This paper presents two different key estimation attacks targeted for the image watermarking system proposed for the BOWS-2 contest. Ten thousands images are used in order to estimate the secret key and remove the watermark while minimizing the distortion. Two different techniques are proposed. The first one combines a regression-based denoising process to filter out the component of the original images and a clustering algorithm to compute the different components of the key. The second attack is based on an inline subspace estimation algorithm, which estimates the subspace associated with the secret key without computing eigen decomposition. The key components are then estimated using Independent Component Analysis and a strategy designed to leave efficiently the detection region is presented. On six test images, the two attacks are able to remove the mark with very small distortions (between 41.8 dB and 49 dB).
Fichier principal
Vignette du fichier
mmsec09.pdf (320.56 Ko) Télécharger le fichier
Origine : Accord explicite pour ce dépôt
Loading...

Dates et versions

hal-00384058 , version 1 (14-05-2009)

Identifiants

  • HAL Id : hal-00384058 , version 1

Citer

Patrick Bas, Andreas Westfeld. Two Key Estimation Techniques for the Broken-Arrows Watermarking Scheme. ACM Multimedia and Security Workshop 2009, Sep 2009, Princeton NJ, United States. pp.1-8. ⟨hal-00384058⟩
104 Consultations
179 Téléchargements

Partager

Gmail Facebook X LinkedIn More