1 watermarking scheme capable of resisting sensitivity attack ieee signal processing letters, vol....
TRANSCRIPT
![Page 1: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/1.jpg)
1
Watermarking Scheme Capable
of Resisting Sensitivity Attack
IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang and Shuozhong Wang
![Page 2: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/2.jpg)
2
Outline1. Introduction2. Sensitivity attack3. Watermark detector4. Embedding algorithm5. Detection algorithm6. Security analysis7. Experimental results8. Conclusions
![Page 3: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/3.jpg)
3
Introduction1. This letter proposes a watermarking scheme
capable of defeating the sensitivity attack
a novel tailor-made embedding algorithm a corresponding detection mechanism
are designed to “mislead” the attackers: get a “fake” signal
![Page 4: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/4.jpg)
4
Sensitivity attack(1/3)1. Attacker possesses a watermarked image and an
available detector
2. Remove or change the embedded without causing serious distortion
Original imageWatermark
embedding
Watermarked imagewatermarkdetector
Sensitivityattack
Not watermarkedWatermark
![Page 5: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/5.jpg)
5
Sensitivity attack(2/3)
Not watermarked Watermarked
Decision boundary
Decision boundary : between the “Watermarked” and “Not watermarked” regions is a hyper-plane in a multidimensional space.
![Page 6: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/6.jpg)
6
Sensitivity attack(3/3)
N
n
nnnA
1
)/(
n/1
n
: perpendicular to the decision boundary
: shows how sensitive the detector is to modification in the direction of each vector
: is either +1 or -1 indicates addition or subtraction
Subtracts from the watermarked copy with an increasing strength until the detector reports that no watermark is present. Thus, the embedded watermark is removed.
AA
![Page 7: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/7.jpg)
7
Watermark detector
Public watermark detector
Detectionfunction F
> Threshold
≤ Threshold
Output 1 (Watermarked)
Output 0 (Not watermarked)Black box
Test image
Watermark detector : provide adequate information about an embedded watermark
![Page 8: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/8.jpg)
8
Embedding algorithm(1/6)
C2,
3
C2,
0C1,0
C0,0C2,
2
C2,
1
C1,2 C1,1
C0,2 C0,1
DWT3-levels
Watermark
IDWT
Watermarked image
![Page 9: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/9.jpg)
9
Embedding algorithm(2/6)
p,qCl,θ
63 49-34 7
-131423-31
10
15
-1
7
6
-12
4
13
3
93-75-12314
2
-303
6447-19-5
23-248-14-7-9
6511
-3
5
-2
2
2
6
40-23
3-46
0 -4
3
3 4
6
l,θC l,θN
1 1
1 14
4 4
16
16
16
63 -34
-31 2315
3.25 -3.75
5.17
2.75
2.25
![Page 10: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/10.jpg)
10
Embedding algorithm(3/6)
0.16 0.16
0.160.226
0.32
0.32 0.452
1
1
1.414
l,θW ={ } { }θl
21.00, if =00.32, if =1l
l0.16, if =2 1 , otherwise, if =1
![Page 11: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/11.jpg)
11
Embedding algorithm(4/6)
1M
Mm, p,qS ml,θ 0
mutually independent and satisfy a standard Gaussian distribution with zero mean and unit standard deviation
1. Generate( )data-groups in a pseudo-random manner
2. The number of elements in each data group is equal to that of the host DWT coefficients, and all elements in the groups :
![Page 12: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/12.jpg)
12
Embedding algorithm(5/6)
l θ l,θ
l,θ
l,θ
ml,θm
l,θ W
N
W
p,qSp,qT 2
l θ p q
ml,θm p,qTA 2
l θ p q
ml,θl,θl,θm p,qTC-p,qCu C
M
m
ml,θ
m
ml,θ
'l,θ p,qT
A
u-p,qCp,qC
0
C
where
All modified DWT coefficients are inversely transformed to yield a watermarked copy
: modified DWT coefficients
![Page 13: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/13.jpg)
13
Embedding algorithm(6/6)
1. According to the central limit theorem is very close to its mean 1 All are approximately 0
2. Standard deviation of
Cum
mA
l θl,θl,θ
l θ p ql,θl,θl,θ
u WN
WC-p,qC
Cσ2
2
Cum
)1(
255log10
2
212
10 M
NNPSNR
uw
![Page 14: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/14.jpg)
14
Detection algorithm (1/2)
M
m
"m
" Cu-CuMU1
0
"u CσMM-.E 80
2
EUF
1. If output “ Watermarked ” output “ Not watermarked ”
0F
0F
![Page 15: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/15.jpg)
15
Detection algorithm (2/2)
1. If test image contains watermark, all close to 0
2. If test image contains no watermark
3. M 189 avoid excessive distortion
0 U
02
E
F
-ECσ-MM.dt eπ
tCσ-MM U "
u
t-
-
"u
802
2
2
02
E
-F
mu
![Page 16: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/16.jpg)
16
Security analysis
mu mT
1. Attacker does not knowand is impossible to estimate by
measuring the sensitivities ofmu
2. The detection function of the attacked signal always greater than 0 ( F > 0).
This means the sensitivity attack cannot remove the embedded watermark.
![Page 17: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/17.jpg)
17
Experimental resultsImage Detection
function F
Original -1.7104
Watermarked
1.5104
A 960 1280 still image captured by a digital camera wasused as the original test signal. The system parameter M=189
![Page 18: 1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp. 125-128 Xinpeng Zhang](https://reader035.vdocuments.us/reader035/viewer/2022070414/5697c0061a28abf838cc58cc/html5/thumbnails/18.jpg)
18
Conclusions
1. The proposed watermarking scheme is capable of defeating the sensitivity attack.
2. The corresponding detection mechanism can mislead the attackers.
3. The output of detector cannot be used to remove watermark with low distortion.