Automatic recovery of invisible image watermarks from geometrically distorted images

被引:4
|
作者
Braudaway, GW [1 ]
Mintzer, F [1 ]
机构
[1] IBM Corp, Thomas J Watson Res Ctr, Yorktown Heights, NY 10598 USA
关键词
D O I
10.1117/1.1287836
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
One method of attacking an imbedded invisible watermark is to create a derivative image that is geometrically distorted relative to the original. One attack, developed at Cambridge University, is called "StirMark."(1) image-distorting methods modify images so subtly that the changes are essentially unnoticeable to a viewer. However, their effect on invisible watermarks can be devastating, rendering them unextractable. In this paper, an automated countermeasure to image-distorting attacks will be described. Employing an unmarked copy of the original image as a reference, the possible distortion in a suspect image is first detected by the method, then measured, and finally reversed, producing a restored image approximately geometrically aligned with the original. Using a robust invisible watermarking method described previously by one of the authors to produce a watermarked image, "StirMark" to distort the watermarked image, and a copy of the original unmarked Image for reference, the restoration method is demonstrated to be sufficient by showing successful extraction of the imbedded watermark from a restored image. (C) 2000 SPIE and IS&T. [S1017-9909(00)00904-1].
引用
收藏
页码:477 / 483
页数:7
相关论文
共 50 条
  • [31] Watermarks based on Pyramidal Images for Tampering Image Self-Restoration
    Calderon, Felix
    Flores, Juan J.
    Bravo-Solorio, Sergio
    2022 IEEE INTERNATIONAL AUTUMN MEETING ON POWER, ELECTRONICS AND COMPUTING (ROPEC), 2022,
  • [32] HEURISTIC METHODS OF THE RECOVERY OF ATMOSPHERE-DISTORTED IMAGES
    RYAKHIN, AD
    ROZHKOV, IA
    SOVIET JOURNAL OF OPTICAL TECHNOLOGY, 1991, 58 (04): : 194 - 199
  • [33] The invisible Image. The Aesthetics of prohibition of images
    Cottin, Jerome
    ETUDES THEOLOGIQUES ET RELIGIEUSES, 2007, 82 (03): : 459 - 460
  • [34] Automatic facade recovery from single nighttime image
    Zhou, Yi
    Geng, Qichuan
    Zhou, Zhong
    Wu, Wei
    FRONTIERS OF COMPUTER SCIENCE, 2020, 14 (01) : 95 - 104
  • [35] Image tamper detection and recovery based on dual watermarks sharing strategy
    Chen, Yi-Hui
    Chang, Chin-Chen
    Journal of Digital Information Management, 2012, 10 (01): : 39 - 49
  • [36] Quality evaluation and nonuniform compression of geometrically distorted images using the quadtree distortion map
    Costa, C
    De Natale, FGB
    Granelli, F
    EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2004, 2004 (12) : 1899 - 1911
  • [37] Quality Evaluation and Nonuniform Compression of Geometrically Distorted Images Using the Quadtree Distortion Map
    Cristina Costa
    Francesco G.B. De Natale
    Fabrizio Granelli
    EURASIP Journal on Advances in Signal Processing, 2004
  • [38] Perceptual quality evaluation of geometrically distorted images using relevant geometric transformation modeling
    Setyawan, I
    Delannay, D
    Macq, B
    Lagendijk, RL
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 85 - 94
  • [39] Application of invisible image watermarks to produce remotely printed, duplication resistant, and demonstrably authentic documents
    Braudaway, GW
    Mintzer, F
    Socolofsky, JM
    Tresser, C
    Wu, CW
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 : 351 - 359
  • [40] Image hashing framework for tampering localization in distorted images
    Hu, Yuan-Yuan
    Luo, Hao
    Niu, Xia-Mu
    IEICE ELECTRONICS EXPRESS, 2010, 7 (22): : 1679 - 1685