Blind Attack on Watermarked Images Based on Segmentation and Non-Local Similarity

Document Type : Original Article

Authors

Department of Computer Engineering, Ferdowsi University of Mashhad, Mashhad, Iran

Abstract

In this paper, a new attack is proposed on blind image watermarking, which is able to destroy the watermark embedded in an image using quantization and dither modulation embedding methods. This attack is consist of three main steps: The first two steps are segmentation and finding more similar regions of image and the third step is swapping similar regions with each other. One of the main idea in the proposed method is the algorithm of finding similar segments, which are far from each other and also are in indistinctive locations. This attack does not need to know the embedding and extraction algorithms and their parameters which are used. Therefore, this method is a blind attack. The results of this algorithm and its comparison with other intentional and unintentional attacks show that it can destroy embedded watermark properly and can preserve the quality of watermarked image. The value of NC metric is less than 0.4 and the value of PSNR metric is about 39 dB between the watermarked image and the attacked image.

Keywords

Main Subjects


[1] امیرمسعود مولائی کرمانی، محمدحسین صداقی، حسین ابراهیم‌نژاد، «استگانوگرافی کور مبتنی بر کدهای Reed-Solomon و جدول جانشانی بهینه با بهبود بار مفید جاسازی و مقاومت»، مجله مهندسی برق تبریز، دوره 43، شماره دو، صفحه 59-43، زمستان 92.
[2] C. Song, S. Sudirman, M. Merabti, and D. Llewellyn-Jones, “Analysis of digital image watermark attacks,” In Proc. Consumer Communications and Networking Conference (CCNC), pp. 1-5, 2010.
[3] M. F. Mansour, and A. H. Tewfik, “Attacks on quantization-based watermarking schemes,” In Proc. Signal Processing and Its Applications, vol. 2, pp. 367-370, 2003.
[4] T. C. Hsu, W. S. Hsieh, and T. S. Su, “A new watermark attacking method based on eigen-image energy,” In Proc. Intelligent Information Hiding and Multimedia Signal, (IIHMSP), pp. 29-32, 2008.
[5] G. C. Ting, B. M. Goi, and S. H. Heng, “Attacks on a robust watermarking scheme based on self-reference image,” Computer Standards & Interfaces, vol. 30, no. 1, pp. 32-35, 2008.
[6] H. C. Ling, R. C. Phan, and S. H. Heng, “Attacks on SVD-based watermarking schemes,” In Proc. Intelligence and Security Informatics, pp. 83-91, 2008.
[7] P. Meerwald, C. Koidl, and A. Uhl, “Targeted attacks on quantization-based watermarking schemes,” In Proc. Image and Signal Processing and Analysis (ISPA), pp. 465-470, 2009.
[8] J. M. Guo, and H. Prasetyo, “Security analyses of the watermarking scheme based on redundant discrete wavelet transform and singular value decomposition,” AEU-International Journal of Electronics and Communications, vol. 68, no. 9, pp. 816-834, 2014.
[9] P. Nikbakht, and M. Mahdavi, “Targeted watermark removal of a SVD-based image watermarking scheme,” InInformation and Knowledge Technology (IKT), pp. 1-6, 2015.
[10] P. Nikbakht, and M. Mahdavi, “Targeted dewatermarking of two non-blind SVD-based image watermarking schemes,” In Proc. Computer and Knowledge Engineering (ICCKE), pp. 80-86, 2015.
[11] O. O. Khalifa, Y. binti Yusof, and A. H. Abdalla, "State-of-the-art digital watermarking attacks," IEEE International Conference on. Computer and Communication Engineering (ICCCE), , pp. 744-750, 2012.
[12] A. H. Taherinia, and M. Jamzad, “A two‐step watermarking attack using long‐range correlation image restoration,” Security and Communication Networks, vol. 5, no. 6, pp. 625-635, 2012.
[13] D. Zhang, and Z. Wang, “Image information restoration based on long-range correlation,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 12, no. 5, pp. 331-341, 2002.
[14] A. H. Taherinia, and M. Jamzad, “A new watermarking attack based on content-aware image resizing,” In Proc. Multimedia, Signal Processing and Communication Technologies, pp. 177-180, 2009.
[15] A. H. Taherinia, and M. Jamzad, “Blind dewatermarking method based on wavelet transform,” Optical Engineering, vol. 50, no. 5, pp.  057006-057006, 2011.
[16] P. L. Shrestha, M. Hempel, T. Ma, D. Peng, and H. Sharif, “A general attack method for steganography removal using Pseudo-CFA re-interpolation,” In Proc. Internet Technology and Secured Transactions (ICITST), pp. 454-459, 2011.
[17] V. S. Verma, and R. K. Jha, “Improved watermarking technique based on significant difference of lifting wavelet coefficients,” Signal, Image and Video Processing, vol. 9, no. 6,  pp. 1443-1450, 2015.
[18] R. Achanta, A. Shaji, K. Smith, A. Lucchi, P. Fua, and S. Susstrunk,  “SLIC superpixels compared to state-of-the-art superpixel methods,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 34, no. 11, pp. 2274-2282, 2012.