• Aucun résultat trouvé

Generalized watermark attack based on watermark estimation and perceptual remodulation

N/A
N/A
Protected

Academic year: 2022

Partager "Generalized watermark attack based on watermark estimation and perceptual remodulation"

Copied!
34
0
0

Texte intégral

(1)

Proceedings Chapter

Reference

Generalized watermark attack based on watermark estimation and perceptual remodulation

VOLOSHYNOVSKYY, Svyatoslav, et al.

Abstract

Digital image watermarking has become a popular technique for authentication and copyright protection. For verifying the security and robustness of watermarking algorithms, specific attacks have to be applied to test the proposed algorithms. In contrast to the known Stirmark attack, which degrades the quality of the image while destroying the watermark, this paper presents a new approach which is based on the estimation of a watermark and the exploitation of the properties of Human Visual System (HVS). The new attack satisfies two important requirements. First, image quality after the attack as perceived by the HVS is not worse than the quality of the stego image. Secondly, the attack uses all available prior information about the watermark and cover image statistics to perform the best watermark removal or damage. The proposed attack is based on a stochastic formulation of the watermark removal problem considering the embedded watermark as additive noise with some probability distribution. The attack scheme consists of two main stages: watermark estimation based a Maximum a Posteriori (MAP) approach and watermark [...]

VOLOSHYNOVSKYY, Svyatoslav, et al. Generalized watermark attack based on watermark estimation and perceptual remodulation. In: Ping Wah Wong and Edward J. Delp. IS\&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II. 2000.

Available at:

http://archive-ouverte.unige.ch/unige:47969

Disclaimer: layout of this document may differ from the published version.

(2)

*HQHUDOL]HGZDWHUPDUNLQJDWWDFNEDVHGRQ

*HQHUDOL]HGZDWHUPDUNLQJDWWDFNEDVHGRQ ZDWHUPDUNHVWLPDWLRQ

ZDWHUPDUNHVWLPDWLRQ DQGSHUFHSWXDO

DQGSHUFHSWXDOUHPRGXODWLRQ UHPRGXODWLRQ

69RORVK\QRYVNL\DE 6 3HUHLUDD

$ +HUULJHOE 1 %DXPJDUWQHUE 7 3XQD

D8QLYHUVLW\ RI *HQHYD 6ZLW]HUODQG

E'LJLWDO &RS\ULJKW 7HFKQRORJLHV =XULFK 6ZLW]HUODQG

(3)

,QWURGXFWLRQ

:DWHUPDUNLQJ 3DUDGLJP

:HDN 3RLQWV RI :DWHUPDUNLQJ $OJRULWKPV :DWHUPDUN $WWDFNV

5HVXOWV

&RQFOXVLRQV

2XWOLQH

2XWOLQH

(4)

,QWURGXFWLRQ ,QWURGXFWLRQ

3UREOHP

0DUNHW UHTXLUHV FRS\ULJKW SURWHFWLRQ WHFKQRORJ\

IRU LPDJHV 03(* DQG DXGLR VLQFH FRS\LQJ LV HDV\ TXLFN DQG ZLWK WKH PRVW UHFHQW WHFKQRORJ\ ORVVOHVV HJ &'520 ZULWLQJ

3RVVLEOH 6ROXWLRQ LQVHUWLRQ RI D ZDWHUPDUN :0 ZKLFK FDQ EH XVHG WR DXWKHQWLFDWH DQ LPDJH DXGLR VRXQGWUDFN 03(* HWF

:DWHUPDUN FRQWDLQV IRU H[DPSOH XQLTXH LGHQWLILHU

VSHFLI\LQJ EX\HU DQG VHOOHU PRVW XVHIXO DUH :0 ZKLFK KDYH DW OHDVW ELWV RI LQIRUPDWLRQ

(5)

,QWURGXFWLRQ ,QWURGXFWLRQ

z 5REXVWQHVV :0 PXVW UHVLVW PDLQ

‡ JHRPHWULFDO DWWDFNV GHV\QFKURQL]DWLRQ HJ FURSSLQJ DQG WUDQVODWLRQ DIILQH WUDQVIRUPDWLRQV OLNH URWDWLRQ VFDOLQJ DVSHFW UDWLR FKDQJHV URZFROXPQ UHPRYDO UDQGRP ORFDO GLVWRUWLRQV

‡ VLJQDO SURFHVVLQJ DWWDFNV QRQOLQHDU DQG DGDSWLYH ILOWHULQJ FRPSUHVVLRQ UHTXDQWL]DWLRQ PXOWLSOH ZDWHUPDUNV DQG QRLVH DGGLWLRQ

z:0 VKRXOG EH LQYLVLEOH DQG GHWHFWDEOH ZLWKRXW RULJLQDO LPDJH REOLYLRXV

(6)

,QWURGXFWLRQ ,QWURGXFWLRQ

3UREOHPV

z QR VWDQGDUG JHQHUDO SXUSRVH EHQFKPDUN

z ODFN RI UREXVWQHVV WR DWWDFNV :K\ ZRUN RQ DWWDFNV

z GHYHORS EHWWHU ZDWHUPDUNLQJ PHWKRGV

z GHILQH EHWWHU EHQFKPDUNLQJ

3LRQHHULQJ ZRUN 6WLUPDUN EHQFKPDUNLQJ 8Q]LJQ

(7)

,QWURGXFWLRQ ,QWURGXFWLRQ

*RDOV RI ZDWHUPDUNLQJ DWWDFNV 1RWDWLRQV

RULJLQDO FRYHU LPDJH QRLVHOLNH ZDWHUPDUN VWHJR LPDJH ZLWK

0DLQ JRDO RI ZDWHUPDUNLQJ DWWDFNV

‡ SUHVHUYH LPDJH TXDOLW\

DWWDFNHG VWHJRLPDJH

‡ UHQGHU ZDWHUPDUN XQGHWHFWDEOHXQGHFRGDEOH

w x

y = + x

w

y

x

y ′ ≅

(8)

,QWURGXFWLRQ ,QWURGXFWLRQ

*RDOV RI ZDWHUPDUNLQJ DWWDFNV 2XU JRDO LV WR XVH SULRU NQRZOHGJH

z RI ZDWHUPDUN DQG FRYHULPDJH VWDWLVWLFV

z RI ZDWHUPDUNLQJ PHWKRG XVHG

WR GHYHORS JHQHUDOL]HG DWWDFN RQ ZDWHUPDUNLQJ VFKHPHV

z WKDW WDNHV LQWR DFFRXQW KXPDQ SHUFHSWLRQ

z LV VWRFKDVWLF DSSOLFDEOH WR D ZLGH FODVV RI LPDJH DQG YLGHR ZDWHUPDUNLQJ DOJRULWKPV RSHUDWLQJ LQ FRRUGLQDWH RU WUDQVIRUP )7 '&7 ZDYHOHW GRPDLQV

(9)

:DWHUPDUNLQJ3DUDGLJP :DWHUPDUNLQJ3DUDGLJP

Encoder Message

b c

Perceptual model Cover

image x

Watermark Embedder

M

Attacks y

Watermark

Extractor Decoder

Key

wˆ

(10)

:DWHUPDUNLQJ3DUDGLJP :DWHUPDUNLQJ3DUDGLJP

0HVVDJH HPEHGGLQJ

z 0HVVDJH LV HQFRGHG XVLQJ HLWKHU 0DU\ PRGXODWLRQ RU (UURU &RUUHFWLRQ &RGHV (&&

z 7KH HQFRGHG PHVVDJH LV VSUHDGHG RYHU WKH FRYHU LPDJH EDVHG RQ DQ RUWKRJRQDO SURMHFWLRQ IXQFWLRQ

z 7KH VSUHDGHG PHVVDJH LV PDVNHG E\ D SHUFHSWXDO PDVN UHVXOWLQJ LQ QRLVHOLNH ZDWHUPDUN DQG DGGHG WR WKH

FRYHULPDJH

b

c

p

M

w

(11)

:DWHUPDUNLQJ3DUDGLJP :DWHUPDUNLQJ3DUDGLJP

0HVVDJH H[WUDFWLRQ

z :DWHUPDUN H[WUDFWLRQ LV EDVHG HLWKHU RQ 0D[LPXP /LNHOLKRRG 0/ RU 0D[LPXP D 3RVWHULRUL 0$3

HVWLPDWRUV 0/

0$3

SGI RI WKH FRYHULPDJH SGI RI WKH ZDWHUPDUN

( y w )

w

w

¦ ~ max

ˆ arg

~

=

p

X

N

( ) ( ) {

y w w

}

w

w

~

¦ ~ max

ˆ arg

~ pX pW

N ′ ⋅

=

()

.

pX

()

.

pW

(

y y

)

w

= +

x w

w

R R

R ˆ ˆ

(12)

:DWHUPDUNLQJ3DUDGLJP :DWHUPDUNLQJ3DUDGLJP

0HVVDJH H[WUDFWLRQ

z 0HVVDJH GHFRGLQJ LV EDVHG PRVWO\ RQ 0/ GHFRGHU

'HVSUHDGLQJ SDUW LV GHVLJQHG EDVHG RQ 0/ GHWHFWLRQ XQGHU DVVXPSWLRQ RI NQRZQ VLJQDO LQ DGGLWLYH

*DXVVLDQ QRLVH

WKH FHQWUDO OLPLW WKHRUHP &/7 DSSUR[LPDWLRQ IRU ODUJH VDPSOH VSDFHV

0/ PHVVDJH GHFRGHU IRU DGGLWLYH ZKLWH *DXVVLDQ QRLVH

p w r = ˆ,

n c r = A +

(

r b x

)

b ~,

¦ max

ˆ arg

~ p

=

(13)

:DWHUPDUNLQJ3DUDGLJP :DWHUPDUNLQJ3DUDGLJP

0HVVDJH H[WUDFWLRQ

Hard or Soft Decoder

r

p wˆ

Max index

rk1

1

pk

wˆ

rkL

L

pk

(&& GHFRGHU

0DUU\ GHPRGXODWRU

(14)

:HDN3RLQWVRI:DWHUPDUNLQJ$OJRULWKPV :HDN3RLQWVRI:DWHUPDUNLQJ$OJRULWKPV

z ZDWHUPDUN SUHGLFWLRQ LV NH\LQGHSHQGHQW

z GHVSUHDGLQJ SDUW LV GHVLJQHG DV 0/ GHWHFWRU IRU $:*1 FKDQQHO

z GHFRGHU LV GHVLJQHG LQ DVVXPSWLRQ RI $:*1

(

y y

)

w

= +

x w

w

R R

R ˆ ˆ

n c r = A +

(

I

)

N

n ~ 0,σn2 p

w r = ˆ,

'HVWUR\ :0

&RS\ :0

(15)

:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV

7KH PDLQ DWWDFNV EDVHG RQ WKH ZHDNQHVVHV RI ZDWHUPDUNLQJ DOJRULWKPV

z GHFUHDVH WKH ZDWHUPDUN UHGXQGDQF\ XVLQJ ZDWHUPDUN UHPRYDO EDVHG RQ GHQRLVLQJFRPSUHVVLRQ

z FUHDWH WKH OHDVW IDYRUDEOH VWDWLVWLFV IRU WKH $:*1

GHFRGHU XVLQJ SHUFHSWXDO UHPRGXODWLRQ RI WKH ZDWHUPDUN

(16)

:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV

0DVNLQJ SURSHUW\ RI +XPDQ 9LVXDO 6\VWHP +96

Stego image Masking property of the HVS

visible masked visible

(17)

:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV

7ZR VWDJH DWWDFN

z 6WDJH ZDWHUPDUN HVWLPDWLRQ DQG UHPRYDO EDVHG RQ GHQRLVLQJFRPSUHVVLRQ

z 6WDJH ZDWHUPDUN UHPRGXODWLRQ XVLQJ ZDWHUPDUN VWDWLVWLFV DQG SURSHUWLHV RI WKH +96

(18)

:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV

%DVLF LGHD

Stego image Attacked image

remodulated Smooth

(19)

:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV

6WDJH ZDWHUPDUN UHPRYDO

0$3 'HQRLVLQJ &RPSUHVVLRQ

ˆ → 0

′ ≅ x and w y

:LHQHU/HH ILOWHU 6RIWVKULQNDJH +DUGVKULQNDJH

&RPSOH[LW\

UHJXODUL]DWLRQ 0RXOLQ /LX

6RIWVKULQNDJH ZLWK 8QLIRUP 7KUHVKROG 4XDQWL]DWLRQ 874

&KDQJ <X 9HWWHUOL

(20)

:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV

0$3 'HQRLVLQJ

$VVXPSWLRQV

WKH HQHUJ\ IXQFWLRQ IRU WKH ** PRGHO

( ) ( )

{

p y x p x

}

x W X

x N

ln ~

¦ ~ ln

max ˆ arg

~ +

=

(

I

)

N d i i

w ~ . . . 0,σw2

(

I

)

Generalized Gaussian

GG

i.i.d. , , x :

~ x γ σ 2

x

( )

+

=

res x

y x

x

σ ρ

2

~ 2

~ 2

min 1 ˆ arg

w

N

( )

res

ρ

(21)

:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV

0$3 'HQRLVLQJ LLG *DXVVLDQ ZDWHUPDUN

z :LHQHU/HH ILOWHU ORFDOO\ LLG *DXVVLDQ LPDJH

z 6RIWVKULQNDJH JOREDOO\ LLG VWDWLRQDU\ *HQHUDOL]HG

*DXVVLDQ V** LPDJH /DSODFLDQ

z +DUGVKULQNDJH JOREDOO\ LLG V** LPDJH

(

I

)

N

w ~ 0,σw2

(

I

)

sGG ,1, x2

~ x σ

x

0 γ

(

y y

)

y

x 2

x 2

w 2

x

+ +

= ³ ³

ˆ ³

(

y y

) (

y y

)

y

xˆ = + max 0, T sign

(

) (

> T

)

+

= y y y 1 y y

=1 γ

(22)

:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV

6FDOLQJVKULQNLQJ GHQRLVLQJ IXQFWLRQV

:LHQHU/HH 6RIWVKULQNDJH +DUGVKULQNDJH

(

y y

) (

y y

) (

y y

)

(23)

:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV

:DWHUPDUN UHPRYDO EDVHG RQ ORVV\ FRPSUHVVLRQ

z &RPSOH[LW\ UHJXODUL]DWLRQ 0$3

( ) ( )

{

y x x

}

xˆ argmax ln ¦ ~ ln ~

~

Γ Γ

+

= pW p

x Γ =

{

~xj,1 j J

}

N

x~ ~xΓ

4

( )

y x

( )

x

{

y x

( ) ( )

x

}

x ~ ~ argmin ~ 2 ln2 ~

2 ln 2 min 1

ˆ arg 2 2

~ 2

~ 2 " W"

W x x

σ = + σ

+

= Γ Γ

(

I

)

N d i i

w ~ . . . 0,σw2

< ;

(24)

:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV

:DWHUPDUN UHPRYDO EDVHG RQ ORVV\ FRPSUHVVLRQ

z 8QLIRUPO\ TXDQWL]HG VRIWVKULQNDJH

T

-T -T T

Q

(25)

:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV

6WDJH ZDWHUPDUN SHUFHSWXDO UHPRGXODWLRQ 3DUWLFXODULWLHV

z VWDJH NLOOV UHPRYHV ZDWHUPDUN PRVWO\ LQ IODW UHJLRQV

z VWDJH FKDQJHV WKH VLJQ RI ZDWHUPDUN RQ RSSRVLWH DQG FUHDWHV RXWOLHUV PRVWO\ LQ WKH DULDV RI HGJHV DQG

WH[WXUHV

(26)

:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV

6WDJH ZDWHUPDUN SHUFHSWXDO UHPRGXODWLRQ

z HVWLPDWLRQ RI ZDWHUPDUN

z HVWLPDWLRQ RI ZDWHUPDUN VLJQ

z SHUFHSWXDO UHPRGXODWLRQ

NVF 1RLVH 9LVLELOLW\ )XQFWLRQ

VWUHQJWK IDFWRU IRU HGJH UHJLRQV

VWUHQJWK IDFWRU IRU IODW UHJLRQV

( )

w

sign s = ˆ

x y wˆ = − ˆ

( )

{

NVF NVF

} ( )

s p

x

y = ˆ + 1 Se + Sf

Se

Sf

0 NVF

1 NVF

(27)

5HVXOWV 5HVXOWV

'LIIHUHQW WHFKQRORJLHV KDYH EHHQ LQYHVWLJDWHG

z '&7

z 'LJLPDUN

z (LNRQDPDUN

z 6\V&RS 6RIWZDUH

$ &RRUGLQDWH GRPDLQ (&&WH[WXUH PDVNLQJ :0 ELWV

% &RRUGLQDWH GRPDLQ 0DU\OXPLQDQFH PDVNLQJ :0 ELWV

& '&7 GRPDLQ (&& -XVW 1RWLFHDEOH 'LIIHUHQFH :0 ELWV 7HVW FDVHV

LPDJHV RI VL]H [

`

(28)

5HVXOWV 5HVXOWV

&ULWHULD IRU HYDOXDWLRQ

&DSDFLW\ & ELWV W\SLFDOO\

5REXVWQHVV 5

z ELW HUURU UDWH

z ELQDU\ GHFLVLRQ :0 GHWHFWHGQRW GHWHFWHG 9LVLELOLW\ 9

z VXEMHFWLYH KXPDQ HYDOXDWLRQ

z +96EDVHG FRPSXWHU PRGHO ZHLJKWHG 3615

9LVLELOLW\ 9

&DSDFLW\ & 5REXVWQHVV 5

(29)

5HVXOWV 5HVXOWV

:HLJKWHG 3615

6WHJR LPDJH 3615 G%

2 2 10

log 255 10

y NVF

x wPSNR

= −

Z3615 G% G% G%

7KH Z3615 LV FORVHU WR SHUFHSWLRQ WKDQ WKH 3615

(30)

5HVXOWV 5HVXOWV

6RIWZDUH $

6WHJR LPDJH 3615 G%

Z3615 G%

:0 \[

:0 \[

$WWDFNHG LPDJH 3615 G%

Z3615 G%

0HVVDJH ZDWHUPDUN ZDV QRW IRXQG

(31)

5HVXOWV 5HVXOWV

6RIWZDUH %

6WHJR LPDJH 3615 G%

Z3615 G%

:0 \[

:0 \[

$WWDFNHG LPDJH 3615 G%

Z3615 G%

0HVVDJH ZDWHUPDUN ZDV QRW IRXQG

(32)

5HVXOWV 5HVXOWV

6RIWZDUH &

6WHJR LPDJH 3615 G%

Z3615 G%

:0 \[

:0 \[

$WWDFNHG LPDJH 3615 G%

Z3615 G%

0HVVDJH ZDWHUPDUN ZDV QRW IRXQG

(33)

5HVXOWV 5HVXOWV

$ % &

:0

\[

:0

\[

(34)

&RQFOXVLRQV

&RQFOXVLRQV

z 3RVVLEOH WR UHPRYH ZDWHUPDUN ZKLOH SUHVHUYLQJ LPDJH TXDOLW\

z :DWHUPDUNLQJ DWWDFNV VKRXOG XVH DV PXFK DV SRVVLEOH RI LPDJH DQG ZDWHUPDUN VWDWLVWLFV

z :DWHUPDUNLQJ DOJRULWKP GHYHORSPHQW VKRXOG DVVXPH WKDW WKH DWWDFNHUV NQRZ \RXU PHWKRG .HUKRII·V

SULQFLSOH

9HU\ XVHIXO WR VWXG\ ZDWHUPDUN DWWDFNV IRU WKH

GHYHORSPHQW RI WKH HQKDQFHG WHFKQRORJLHV DVVXPLQJ WKH EDG JX\V DUH DOZD\V RQH VWHS DKHDG

Références

Documents relatifs

The BCH 1 dataset, provided by Telecom Bretagne, contains four time-varying channel impulse responses (TVIR) measured in the commercial harbor of Brest (France) in the frequency

De plus, pour ces composés 5b-d, on observe la présence d’une phase cristal liquide smectique pour laquelle les molécules ne possèdent plus d’ordre de position au sein des

Le produit brut est purifié par chromatographie sur silice flash (hexane/toluène 9 : 1) suivi d’une recristallisation à partir d’un mélange méthanol/toluène pour obtenir un

Zhu, “High-performance organic field effect transistors : molecular design, device fabrication and physical properties,” Journal of Physical Chemistry B, vol.. Bao and

The underWater AcousTic channEl Replay benchMARK (Watermark) is a realistic simulation tool now made available to the underwater communications community.. It is a shell around

In this type of attack, an adversary tries to obtain unmarked video or audio sequences of the communication partner (such as fragments of speech posted on web sites or captured

The proposed approach is based on shape informa- tion, since the watermark is embedded in image blocks, the location and orien- tation of which are defined by Eulerian tours that

In our case, since we used 5 different scales of the input image, we obtain about 4500 codes per image, which makes the computation of the similarity between two images in the order