This letter describes a permutation attack (PA) to the subsampling-based watermarking scheme where the high correlations between subimages obtained by subsampling the original image are used for watermark embedding. We show that the correlations can also be easily used to attack the watermarking scheme through a simple permutation procedure, while the quality degradation of attacked watermarked image is visually acceptable. Experimental results show the efficiency of the proposed attack algorithm.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Wei LU, Hongtao LU, Fu-Lai CHUNG, "Attacking Subsampling-Based Watermarking" in IEICE TRANSACTIONS on Fundamentals,
vol. E88-A, no. 11, pp. 3239-3240, November 2005, doi: 10.1093/ietfec/e88-a.11.3239.
Abstract: This letter describes a permutation attack (PA) to the subsampling-based watermarking scheme where the high correlations between subimages obtained by subsampling the original image are used for watermark embedding. We show that the correlations can also be easily used to attack the watermarking scheme through a simple permutation procedure, while the quality degradation of attacked watermarked image is visually acceptable. Experimental results show the efficiency of the proposed attack algorithm.
URL: https://globals.ieice.org/en_transactions/fundamentals/10.1093/ietfec/e88-a.11.3239/_p
Copy
@ARTICLE{e88-a_11_3239,
author={Wei LU, Hongtao LU, Fu-Lai CHUNG, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Attacking Subsampling-Based Watermarking},
year={2005},
volume={E88-A},
number={11},
pages={3239-3240},
abstract={This letter describes a permutation attack (PA) to the subsampling-based watermarking scheme where the high correlations between subimages obtained by subsampling the original image are used for watermark embedding. We show that the correlations can also be easily used to attack the watermarking scheme through a simple permutation procedure, while the quality degradation of attacked watermarked image is visually acceptable. Experimental results show the efficiency of the proposed attack algorithm.},
keywords={},
doi={10.1093/ietfec/e88-a.11.3239},
ISSN={},
month={November},}
Copy
TY - JOUR
TI - Attacking Subsampling-Based Watermarking
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 3239
EP - 3240
AU - Wei LU
AU - Hongtao LU
AU - Fu-Lai CHUNG
PY - 2005
DO - 10.1093/ietfec/e88-a.11.3239
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E88-A
IS - 11
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - November 2005
AB - This letter describes a permutation attack (PA) to the subsampling-based watermarking scheme where the high correlations between subimages obtained by subsampling the original image are used for watermark embedding. We show that the correlations can also be easily used to attack the watermarking scheme through a simple permutation procedure, while the quality degradation of attacked watermarked image is visually acceptable. Experimental results show the efficiency of the proposed attack algorithm.
ER -