A multistage VQ based watermarking technique with fake watermarks

  • Authors:
  • Jeng-Shyang Pan;Feng-Hsing Wang;Lakhmi Jain;Nikhil Ichalkaranje

  • Affiliations:
  • Dept. Electronic Eng., National Kaohsiung University of Applied Sciences, Kaohsiung, Taiwan, R.O.C.;School of Electrical and Information Eng., University of South Australia;School of Electrical and Information Eng., University of South Australia;School of Electrical and Information Eng., University of South Australia

  • Venue:
  • IWDW'02 Proceedings of the 1st international conference on Digital watermarking
  • Year:
  • 2002
  • Shadow watermark extraction system

    KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II

Quantified Score

Hi-index 0.00

Visualization

Abstract

Digital watermarking is a technology proposed to help address the concern of copyright protection for digital content. To facilitate tracing of copyright violators, different watermarks carrying information about the transaction or content recipient can be embedded into multimedia content before distribution. Such form of "personalised" watermark is called "fingerprint". A powerful attack against digital fingerprinting is the collusion attack, in which different fingerprinted copies of same host data are jointly processed to remove the fingerprints or hinder their detection. This paper first studies a number of existing collusion attack schemes against image fingerprinting. A new collusion attack scheme is then proposed and evaluated, both analytically and empirically. Attack performance in terms of fingerprint detectability and visual quality degradation after attack is assessed. Results obtained from spread spectrum fingerprinting experiments show that the proposed attack can impede fingerprint detection using as few as three fingerprinted images without introducing noticeable visual degradation, hence it is more powerful than those reported in literature. It is also found that increasing the fingerprint embedding strength and spreading factor do not help resist such malicious attacks.