Abstract
We propose an effective attack based on exposure time change and image fusion, called ETC attack. First, the ETC attack simulates a set of images with different exposure time using the watermarked image. Then it applies an image fusion method to blend the multiple images mentioned above and thus generates a new image similar to the original one. In this paper, we describe the rationale of the attack. To illustrate the effect of the ETC attack, we present the results of the ETC attack against one watermarking scheme Iterative Watermarking Embedding. It can be shown that the ETC attack has an important impact on watermark decoding and detection, while not severely reducing the quality of the image.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kirovski, D., Petitcolas, F.: Blind pattern matching attack on watermarking systems. IEEE Transactions on Signal Processing 51, 1045–1053 (2003)
Maes, M.: Twin peaks: the histogram attack to fixed depth image watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 290–305. Springer, Heidelberg (1998)
Cox, I., Kilian, J., Leighton, F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6, 1673–1687 (1997)
Xia, X., Boncelet, C., Arce, G.: A multiresolution watermark for digital images. In: Proceedings of the International Conference on Image Processing, vol. 1 (1997)
Wong, P.: Image watermarking and data hiding techniques. PhD thesis, Department of Electronic and Computer Engineering. The Hong Kong University of Science and Technology, Hong Kong, China (2003), http://www.ece.ust.hk/~eepeter/paperpdf/Peter.PhD.Thesis.pdf
Debevec, P., Malik, J.: Recovering high dynamic range radiance maps from photographs. In: Proceedings of the 24th Annual Conference on Computer Graphics and Interactive Techniques, pp. 369–378 (1997)
Bhukhanwala, S., Ramabadran, T.: Automated global enhancement of digitized photographs. IEEE Transactions on Consumer Electronics 40, 1–10 (1994)
Wang, Z., Bovik, A., Sheikh, H., Simoncelli, E.: Image quality assessment: from error visibility to structural similarity. IEEE Transactions on Image Processing 13, 600–612 (2004)
Ardeshir Goshtasby, A., Nikolov, S.: Image fusion: advances in the state of the art. Information Fusion 8, 114–118 (2007)
Piella, G.: A general framework for multiresolution image fusion: from pixels to regions. Information Fusion 4, 259–280 (2003)
Burt, P.: The pyramid as a structure for efficient computation. Multiresolution Image Processing and Analysis 35 (1984)
Sims, S., Phillips, M.: Target signature consistency of image data fusion alternatives. Optical Engineering 36, 743 (1997)
Zhang, Z., Blum, R.: A categorization of multiscale-decomposition-based image fusionschemes with a performance study for a digital camera application. Proceedings of the IEEE 87, 1315–1326 (1999)
Rockinger, O., Fechner, T.: Pixel-level image fusion: the case of image sequences. In: Proceedings of the SPIE, vol. 3374, pp. 378–388 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, K., Zhang, D., Chen, Dr. (2009). Exposure Time Change Attack on Image Watermarking Systems. In: Kim, HJ., Katzenbeisser, S., Ho, A.T.S. (eds) Digital Watermarking. IWDW 2008. Lecture Notes in Computer Science, vol 5450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04438-0_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-04438-0_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04437-3
Online ISBN: 978-3-642-04438-0
eBook Packages: Computer ScienceComputer Science (R0)