Spatial tessellations: concepts and applications of Voronoi diagrams
Spatial tessellations: concepts and applications of Voronoi diagrams
Second Generation Benchmarking and Application Oriented Evaluation
IHW '01 Proceedings of the 4th International Workshop on Information Hiding
A wavelet-tree-based watermarking method using distance vector of binary cluster
Expert Systems with Applications: An International Journal
A blind watermarking method using maximum wavelet coefficient quantization
Expert Systems with Applications: An International Journal
Image copyright protection with forward error correction
Expert Systems with Applications: An International Journal
A robust spread spectrum watermarking method using two levels DCT
International Journal of Electronic Security and Digital Forensics
A new approach for optimization in image watermarking by using genetic algorithms
IEEE Transactions on Signal Processing
An Efficient Watermarking Method Based on Significant Difference of Wavelet Coefficient Quantization
IEEE Transactions on Multimedia
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Image quality assessment: from error visibility to structural similarity
IEEE Transactions on Image Processing
Image information restoration based on long-range correlation
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
This paper presents an efficient scheme for blind watermark attacking using the concept of matching of the long-range data. The main idea of the proposed attack is to add plenty of noise to the watermarked image and then try to restore an unwatermarked copy of the noisy image. The aim is to destroy the watermark information without accessing the parameters used during the watermark embedding process. So, it allows our approach to be completely free from any pre-assumption on the watermarking algorithm or any other parameters that is used during the watermark embedding procedure. Experimental results show the proposed algorithm's superiority over several other traditional watermarking benchmarks such as Stirmark and Optimark. Peak signal-to-noise ratio of the watermarked image after applying the proposed attack is more than 45 dB, and the normalized cross-correlation for the extracted watermark is lower than 0·4, so the watermark is not detectable after our attack. Copyright © 2012 John Wiley & Sons, Ltd.