Conference Proceeding Article
Public-key watermarking schemes are required to possess two desirable properties: allowing everyone to determine whether a watermark exists in an image or not and ensuring high detection probability in case of malicious modification. In this paper we propose an attack which pollutes the watermark embedded in an image with an optimal colored noise so as to fool the detector of the underlying public-key watermarking scheme. We further show how to apply the proposed pollution attack to public-key subspace watermarking schemes to generate pirated images of high quality but of low detection probability. Our experiment results demonstrate that the proposed pollution attack is very effective.
Watermarking, Detectors, Pollution, Vectors, Public key, Feature extraction, Noise, Sensitivity Analysis, Public-key Watermarking
IEEE International Conference on Multimedia and Expo (ICME) 2012: 9-13 July 2012, Melbourne, Australia: Proceedings
IEEE Computer Society
City or Country
Los Alamitos, CA
WU, Yongdong and DENG, Robert H..
A Pollution Attack to Public-key Watermarking Schemes. (2012). IEEE International Conference on Multimedia and Expo (ICME) 2012: 9-13 July 2012, Melbourne, Australia: Proceedings. 230-235. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/1651
Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.