Proceedings Chapter
Reference
Generalized watermark attack based on watermark estimation and perceptual remodulation
VOLOSHYNOVSKYY, Svyatoslav, et al.
Abstract
Digital image watermarking has become a popular technique for authentication and copyright protection. For verifying the security and robustness of watermarking algorithms, specific attacks have to be applied to test the proposed algorithms. In contrast to the known Stirmark attack, which degrades the quality of the image while destroying the watermark, this paper presents a new approach which is based on the estimation of a watermark and the exploitation of the properties of Human Visual System (HVS). The new attack satisfies two important requirements. First, image quality after the attack as perceived by the HVS is not worse than the quality of the stego image. Secondly, the attack uses all available prior information about the watermark and cover image statistics to perform the best watermark removal or damage. The proposed attack is based on a stochastic formulation of the watermark removal problem considering the embedded watermark as additive noise with some probability distribution. The attack scheme consists of two main stages: watermark estimation based a Maximum a Posteriori (MAP) approach and watermark [...]
VOLOSHYNOVSKYY, Svyatoslav, et al. Generalized watermark attack based on watermark estimation and perceptual remodulation. In: Ping Wah Wong and Edward J. Delp. IS\&T/SPIE's 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II. 2000.
Available at:
http://archive-ouverte.unige.ch/unige:47969
Disclaimer: layout of this document may differ from the published version.
*HQHUDOL]HGZDWHUPDUNLQJDWWDFNEDVHGRQ
*HQHUDOL]HGZDWHUPDUNLQJDWWDFNEDVHGRQ ZDWHUPDUNHVWLPDWLRQ
ZDWHUPDUNHVWLPDWLRQ DQGSHUFHSWXDO
DQGSHUFHSWXDOUHPRGXODWLRQ UHPRGXODWLRQ
69RORVK\QRYVNL\DE 6 3HUHLUDD
$ +HUULJHOE 1 %DXPJDUWQHUE 7 3XQD
D8QLYHUVLW\ RI *HQHYD 6ZLW]HUODQG
E'LJLWDO &RS\ULJKW 7HFKQRORJLHV =XULFK 6ZLW]HUODQG
,QWURGXFWLRQ
:DWHUPDUNLQJ 3DUDGLJP
:HDN 3RLQWV RI :DWHUPDUNLQJ $OJRULWKPV :DWHUPDUN $WWDFNV
5HVXOWV
&RQFOXVLRQV
2XWOLQH
2XWOLQH
,QWURGXFWLRQ ,QWURGXFWLRQ
3UREOHP
0DUNHW UHTXLUHV FRS\ULJKW SURWHFWLRQ WHFKQRORJ\
IRU LPDJHV 03(* DQG DXGLR VLQFH FRS\LQJ LV HDV\ TXLFN DQG ZLWK WKH PRVW UHFHQW WHFKQRORJ\ ORVVOHVV HJ &'520 ZULWLQJ
3RVVLEOH 6ROXWLRQ LQVHUWLRQ RI D ZDWHUPDUN :0 ZKLFK FDQ EH XVHG WR DXWKHQWLFDWH DQ LPDJH DXGLR VRXQGWUDFN 03(* HWF
:DWHUPDUN FRQWDLQV IRU H[DPSOH XQLTXH LGHQWLILHU
VSHFLI\LQJ EX\HU DQG VHOOHU PRVW XVHIXO DUH :0 ZKLFK KDYH DW OHDVW ELWV RI LQIRUPDWLRQ
,QWURGXFWLRQ ,QWURGXFWLRQ
z 5REXVWQHVV :0 PXVW UHVLVW PDLQ
JHRPHWULFDO DWWDFNV GHV\QFKURQL]DWLRQ HJ FURSSLQJ DQG WUDQVODWLRQ DIILQH WUDQVIRUPDWLRQV OLNH URWDWLRQ VFDOLQJ DVSHFW UDWLR FKDQJHV URZFROXPQ UHPRYDO UDQGRP ORFDO GLVWRUWLRQV
VLJQDO SURFHVVLQJ DWWDFNV QRQOLQHDU DQG DGDSWLYH ILOWHULQJ FRPSUHVVLRQ UHTXDQWL]DWLRQ PXOWLSOH ZDWHUPDUNV DQG QRLVH DGGLWLRQ
z:0 VKRXOG EH LQYLVLEOH DQG GHWHFWDEOH ZLWKRXW RULJLQDO LPDJH REOLYLRXV
,QWURGXFWLRQ ,QWURGXFWLRQ
3UREOHPV
z QR VWDQGDUG JHQHUDO SXUSRVH EHQFKPDUN
z ODFN RI UREXVWQHVV WR DWWDFNV :K\ ZRUN RQ DWWDFNV
z GHYHORS EHWWHU ZDWHUPDUNLQJ PHWKRGV
z GHILQH EHWWHU EHQFKPDUNLQJ
3LRQHHULQJ ZRUN 6WLUPDUN EHQFKPDUNLQJ 8Q]LJQ
,QWURGXFWLRQ ,QWURGXFWLRQ
*RDOV RI ZDWHUPDUNLQJ DWWDFNV 1RWDWLRQV
RULJLQDO FRYHU LPDJH QRLVHOLNH ZDWHUPDUN VWHJR LPDJH ZLWK
0DLQ JRDO RI ZDWHUPDUNLQJ DWWDFNV
SUHVHUYH LPDJH TXDOLW\
DWWDFNHG VWHJRLPDJH
UHQGHU ZDWHUPDUN XQGHWHFWDEOHXQGHFRGDEOH
w x
y = + x
w
y
x
y ′ ≅
,QWURGXFWLRQ ,QWURGXFWLRQ
*RDOV RI ZDWHUPDUNLQJ DWWDFNV 2XU JRDO LV WR XVH SULRU NQRZOHGJH
z RI ZDWHUPDUN DQG FRYHULPDJH VWDWLVWLFV
z RI ZDWHUPDUNLQJ PHWKRG XVHG
WR GHYHORS JHQHUDOL]HG DWWDFN RQ ZDWHUPDUNLQJ VFKHPHV
z WKDW WDNHV LQWR DFFRXQW KXPDQ SHUFHSWLRQ
z LV VWRFKDVWLF DSSOLFDEOH WR D ZLGH FODVV RI LPDJH DQG YLGHR ZDWHUPDUNLQJ DOJRULWKPV RSHUDWLQJ LQ FRRUGLQDWH RU WUDQVIRUP )7 '&7 ZDYHOHW GRPDLQV
:DWHUPDUNLQJ3DUDGLJP :DWHUPDUNLQJ3DUDGLJP
Encoder Message
b c
Perceptual model Cover
image x
Watermark Embedder
M
Attacks y
Watermark
Extractor Decoder y´
Key
wˆ bˆ
:DWHUPDUNLQJ3DUDGLJP :DWHUPDUNLQJ3DUDGLJP
0HVVDJH HPEHGGLQJ
z 0HVVDJH LV HQFRGHG XVLQJ HLWKHU 0DU\ PRGXODWLRQ RU (UURU &RUUHFWLRQ &RGHV (&&
z 7KH HQFRGHG PHVVDJH LV VSUHDGHG RYHU WKH FRYHU LPDJH EDVHG RQ DQ RUWKRJRQDO SURMHFWLRQ IXQFWLRQ
z 7KH VSUHDGHG PHVVDJH LV PDVNHG E\ D SHUFHSWXDO PDVN UHVXOWLQJ LQ QRLVHOLNH ZDWHUPDUN DQG DGGHG WR WKH
FRYHULPDJH
b
c
p
M
w
:DWHUPDUNLQJ3DUDGLJP :DWHUPDUNLQJ3DUDGLJP
0HVVDJH H[WUDFWLRQ
z :DWHUPDUN H[WUDFWLRQ LV EDVHG HLWKHU RQ 0D[LPXP /LNHOLKRRG 0/ RU 0D[LPXP D 3RVWHULRUL 0$3
HVWLPDWRUV 0/
0$3
SGI RI WKH FRYHULPDJH SGI RI WKH ZDWHUPDUN
( y w )
w
w
¦ ~ max
ˆ arg
~
′
=
ℜ
∈
p
XN
( ) ( ) {
y w w}
w
w
~
¦ ~ max
ˆ arg
~ pX pW
N ′ ⋅
= ∈ℜ
()
.pX
()
.pW
(
y y)
w ′− ′
= +
x w
w
R R
R ˆ ˆ
⇒
:DWHUPDUNLQJ3DUDGLJP :DWHUPDUNLQJ3DUDGLJP
0HVVDJH H[WUDFWLRQ
z 0HVVDJH GHFRGLQJ LV EDVHG PRVWO\ RQ 0/ GHFRGHU
'HVSUHDGLQJ SDUW LV GHVLJQHG EDVHG RQ 0/ GHWHFWLRQ XQGHU DVVXPSWLRQ RI NQRZQ VLJQDO LQ DGGLWLYH
*DXVVLDQ QRLVH
WKH FHQWUDO OLPLW WKHRUHP &/7 DSSUR[LPDWLRQ IRU ODUJH VDPSOH VSDFHV
0/ PHVVDJH GHFRGHU IRU DGGLWLYH ZKLWH *DXVVLDQ QRLVH
p w r = ˆ,
n c r = A +
(
r b x)
b ~,
¦ max
ˆ arg
~ p
=
:DWHUPDUNLQJ3DUDGLJP :DWHUPDUNLQJ3DUDGLJP
0HVVDJH H[WUDFWLRQ
Hard or Soft Decoder
∑ r bˆ
⊗
p wˆMax index
bˆ
∑ rk1
⊗
1
pk
wˆ
∑ rkL
⊗
L
pk
(&& GHFRGHU
0DUU\ GHPRGXODWRU
:HDN3RLQWVRI:DWHUPDUNLQJ$OJRULWKPV :HDN3RLQWVRI:DWHUPDUNLQJ$OJRULWKPV
z ZDWHUPDUN SUHGLFWLRQ LV NH\LQGHSHQGHQW
z GHVSUHDGLQJ SDUW LV GHVLJQHG DV 0/ GHWHFWRU IRU $:*1 FKDQQHO
z GHFRGHU LV GHVLJQHG LQ DVVXPSWLRQ RI $:*1
(
y y)
w ′− ′
= +
x w
w
R R
R ˆ ˆ
n c r = A +
(
I)
N
n ~ 0,σn2 p
w r = ˆ,
'HVWUR\ :0
&RS\ :0
:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV
7KH PDLQ DWWDFNV EDVHG RQ WKH ZHDNQHVVHV RI ZDWHUPDUNLQJ DOJRULWKPV
z GHFUHDVH WKH ZDWHUPDUN UHGXQGDQF\ XVLQJ ZDWHUPDUN UHPRYDO EDVHG RQ GHQRLVLQJFRPSUHVVLRQ
z FUHDWH WKH OHDVW IDYRUDEOH VWDWLVWLFV IRU WKH $:*1
GHFRGHU XVLQJ SHUFHSWXDO UHPRGXODWLRQ RI WKH ZDWHUPDUN
:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV
0DVNLQJ SURSHUW\ RI +XPDQ 9LVXDO 6\VWHP +96
Stego image Masking property of the HVS
visible masked visible
:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV
7ZR VWDJH DWWDFN
z 6WDJH ZDWHUPDUN HVWLPDWLRQ DQG UHPRYDO EDVHG RQ GHQRLVLQJFRPSUHVVLRQ
z 6WDJH ZDWHUPDUN UHPRGXODWLRQ XVLQJ ZDWHUPDUN VWDWLVWLFV DQG SURSHUWLHV RI WKH +96
:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV
%DVLF LGHD
Stego image Attacked image
remodulated Smooth
:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV
6WDJH ZDWHUPDUN UHPRYDO
0$3 'HQRLVLQJ &RPSUHVVLRQ
ˆ → 0
′ ≅ x and w y
:LHQHU/HH ILOWHU 6RIWVKULQNDJH +DUGVKULQNDJH
&RPSOH[LW\
UHJXODUL]DWLRQ 0RXOLQ /LX
6RIWVKULQNDJH ZLWK 8QLIRUP 7KUHVKROG 4XDQWL]DWLRQ 874
&KDQJ <X 9HWWHUOL
:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV
0$3 'HQRLVLQJ
$VVXPSWLRQV
WKH HQHUJ\ IXQFWLRQ IRU WKH ** PRGHO
( ) ( )
{
p y x p x}
x W X
x N
ln ~
¦ ~ ln
max ˆ arg
~ +
= ∈ℜ
(
I)
N d i i
w ~ . . . 0,σw2
(
I)
Generalized GaussianGG
i.i.d. , , x :
~ x γ σ 2
x
( )
− +
= ∈ℜ
res x
y x
x
σ ρ
2
~ 2
~ 2
min 1 ˆ arg
w
N
( )
resρ
:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV
0$3 'HQRLVLQJ LLG *DXVVLDQ ZDWHUPDUN
z :LHQHU/HH ILOWHU ORFDOO\ LLG *DXVVLDQ LPDJH
z 6RIWVKULQNDJH JOREDOO\ LLG VWDWLRQDU\ *HQHUDOL]HG
*DXVVLDQ V** LPDJH /DSODFLDQ
z +DUGVKULQNDJH JOREDOO\ LLG V** LPDJH
(
I)
N
w ~ 0,σw2
(
I)
sGG ,1, x2
~ x σ
x
→ 0 γ
(
y y)
y
x 2
x 2
w 2
x −
+ +
= ³ ³
ˆ ³
(
y y) (
y y)
y
xˆ = + max 0, − −T sign −
(
−) (
− > T)
+
= y y y 1 y y xˆ
=1 γ
:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV
6FDOLQJVKULQNLQJ GHQRLVLQJ IXQFWLRQV
:LHQHU/HH 6RIWVKULQNDJH +DUGVKULQNDJH
(
y − y) (
y − y) (
y − y)
:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV
:DWHUPDUN UHPRYDO EDVHG RQ ORVV\ FRPSUHVVLRQ
z &RPSOH[LW\ UHJXODUL]DWLRQ 0$3
( ) ( )
{
y x x}
xˆ argmax ln ¦ ~ ln ~
~
Γ Γ
∈ +
= pW p
x Γ =
{
~xj,1≤ j ≤ J}
ℜN
∈
x~ ~x∈Γ
4
( )
y x( )
x{
y x( ) ( )
x}
x ~ ~ argmin ~ 2 ln2 ~
2 ln 2 min 1
ˆ arg 2 2
~ 2
~ 2 " W"
W x x
σ = − + σ
− +
= ∈Γ ∈Γ
(
I)
N d i i
w ~ . . . 0,σw2
< ;
:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV
:DWHUPDUN UHPRYDO EDVHG RQ ORVV\ FRPSUHVVLRQ
z 8QLIRUPO\ TXDQWL]HG VRIWVKULQNDJH
T
-T -T T
Q ∆
:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV
6WDJH ZDWHUPDUN SHUFHSWXDO UHPRGXODWLRQ 3DUWLFXODULWLHV
z VWDJH NLOOV UHPRYHV ZDWHUPDUN PRVWO\ LQ IODW UHJLRQV
z VWDJH FKDQJHV WKH VLJQ RI ZDWHUPDUN RQ RSSRVLWH DQG FUHDWHV RXWOLHUV PRVWO\ LQ WKH DULDV RI HGJHV DQG
WH[WXUHV
:DWHUPDUN$WWDFNV :DWHUPDUN$WWDFNV
6WDJH ZDWHUPDUN SHUFHSWXDO UHPRGXODWLRQ
z HVWLPDWLRQ RI ZDWHUPDUN
z HVWLPDWLRQ RI ZDWHUPDUN VLJQ
z SHUFHSWXDO UHPRGXODWLRQ
NVF 1RLVH 9LVLELOLW\ )XQFWLRQ
VWUHQJWK IDFWRU IRU HGJH UHJLRQV
VWUHQJWK IDFWRU IRU IODW UHJLRQV
( )
wsign s = ˆ
x y wˆ = − ˆ
( )
{
NVF NVF} ( )
s px
y′ = ˆ + 1− ⋅Se + ⋅Sf ⋅ − ⋅ ′
Se
Sf
→ 0 NVF
→1 NVF
5HVXOWV 5HVXOWV
'LIIHUHQW WHFKQRORJLHV KDYH EHHQ LQYHVWLJDWHG
z '&7
z 'LJLPDUN
z (LNRQDPDUN
z 6\V&RS 6RIWZDUH
$ &RRUGLQDWH GRPDLQ (&&WH[WXUH PDVNLQJ :0 ELWV
% &RRUGLQDWH GRPDLQ 0DU\OXPLQDQFH PDVNLQJ :0 ELWV
& '&7 GRPDLQ (&& -XVW 1RWLFHDEOH 'LIIHUHQFH :0 ELWV 7HVW FDVHV
LPDJHV RI VL]H [
`
5HVXOWV 5HVXOWV
&ULWHULD IRU HYDOXDWLRQ
&DSDFLW\ & ELWV W\SLFDOO\
5REXVWQHVV 5
z ELW HUURU UDWH
z ELQDU\ GHFLVLRQ :0 GHWHFWHGQRW GHWHFWHG 9LVLELOLW\ 9
z VXEMHFWLYH KXPDQ HYDOXDWLRQ
z +96EDVHG FRPSXWHU PRGHO ZHLJKWHG 3615
9LVLELOLW\ 9
&DSDFLW\ & 5REXVWQHVV 5
5HVXOWV 5HVXOWV
:HLJKWHG 3615
6WHJR LPDJH 3615 G%
2 2 10
log 255 10
y NVF
x wPSNR
= −
Z3615 G% G% G%
7KH Z3615 LV FORVHU WR SHUFHSWLRQ WKDQ WKH 3615
5HVXOWV 5HVXOWV
6RIWZDUH $
6WHJR LPDJH 3615 G%
Z3615 G%
:0 \[
:0 \[
$WWDFNHG LPDJH 3615 G%
Z3615 G%
0HVVDJH ZDWHUPDUN ZDV QRW IRXQG
5HVXOWV 5HVXOWV
6RIWZDUH %
6WHJR LPDJH 3615 G%
Z3615 G%
:0 \[
:0 \[
$WWDFNHG LPDJH 3615 G%
Z3615 G%
0HVVDJH ZDWHUPDUN ZDV QRW IRXQG
5HVXOWV 5HVXOWV
6RIWZDUH &
6WHJR LPDJH 3615 G%
Z3615 G%
:0 \[
:0 \[
$WWDFNHG LPDJH 3615 G%
Z3615 G%
0HVVDJH ZDWHUPDUN ZDV QRW IRXQG
5HVXOWV 5HVXOWV
$ % &
:0
\[
:0
\[
&RQFOXVLRQV
&RQFOXVLRQV
z 3RVVLEOH WR UHPRYH ZDWHUPDUN ZKLOH SUHVHUYLQJ LPDJH TXDOLW\
z :DWHUPDUNLQJ DWWDFNV VKRXOG XVH DV PXFK DV SRVVLEOH RI LPDJH DQG ZDWHUPDUN VWDWLVWLFV
z :DWHUPDUNLQJ DOJRULWKP GHYHORSPHQW VKRXOG DVVXPH WKDW WKH DWWDFNHUV NQRZ \RXU PHWKRG .HUKRII·V
SULQFLSOH
9HU\ XVHIXO WR VWXG\ ZDWHUPDUN DWWDFNV IRU WKH
GHYHORSPHQW RI WKH HQKDQFHG WHFKQRORJLHV DVVXPLQJ WKH EDG JX\V DUH DOZD\V RQH VWHS DKHDG