A POCS-based algorithm to attack image watermarks embedded in DFT amplitudes

Yiwei Wang, J. Doherty, R.E. Van Dyck
{"title":"A POCS-based algorithm to attack image watermarks embedded in DFT amplitudes","authors":"Yiwei Wang, J. Doherty, R.E. Van Dyck","doi":"10.1109/MWSCAS.2000.951407","DOIUrl":null,"url":null,"abstract":"During recent years, digital watermarking has drawn a lot of attention as a means to protect the copyright of image data. Numerous algorithms have been proposed in different domains. Particularly, a set of these algorithms embed the watermark information in the amplitudes of the discrete Fourier transform (DFT) coefficients. However, studies have shown that the image can be reconstructed by using only the DFT phase information. It is a common belief that watermarking algorithms can be improved by evaluating possible attacking methods and modifying the algorithms accordingly. We propose an algorithm to attack the watermarks embedded in DFT amplitudes. The proposed attacking algorithm uses projection onto convex sets (POCS). The results show that it may be necessary to embed the watermark information in both amplitudes and phases of the DFT coefficients.","PeriodicalId":437349,"journal":{"name":"Proceedings of the 43rd IEEE Midwest Symposium on Circuits and Systems (Cat.No.CH37144)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2000-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 43rd IEEE Midwest Symposium on Circuits and Systems (Cat.No.CH37144)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MWSCAS.2000.951407","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

Abstract

During recent years, digital watermarking has drawn a lot of attention as a means to protect the copyright of image data. Numerous algorithms have been proposed in different domains. Particularly, a set of these algorithms embed the watermark information in the amplitudes of the discrete Fourier transform (DFT) coefficients. However, studies have shown that the image can be reconstructed by using only the DFT phase information. It is a common belief that watermarking algorithms can be improved by evaluating possible attacking methods and modifying the algorithms accordingly. We propose an algorithm to attack the watermarks embedded in DFT amplitudes. The proposed attacking algorithm uses projection onto convex sets (POCS). The results show that it may be necessary to embed the watermark information in both amplitudes and phases of the DFT coefficients.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种基于pocs的攻击嵌入在DFT振幅中的图像水印的算法
近年来,数字水印作为一种保护图像数据版权的手段受到了广泛的关注。在不同的领域已经提出了许多算法。其中一组算法将水印信息嵌入到离散傅立叶变换(DFT)系数的幅值中。然而,研究表明,仅使用DFT相位信息就可以重建图像。人们普遍认为,可以通过评估可能的攻击方法并相应地修改算法来改进水印算法。提出了一种攻击嵌入在DFT幅值中的水印的算法。提出的攻击算法采用凸集投影(POCS)。结果表明,有必要在DFT系数的幅值和相位中同时嵌入水印信息。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A high speed 3.3V current mode CMOS comparators with 10-b resolution Constraints implementation for IQML and MODE direction-of-arrival estimators A fast electric load forecasting using neural networks Noise reduction in speech signals using a TMS320C31 digital signal processor A high-frequency high-Q CMOS active inductor with DC bias control
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1