Paper
9 April 1999 Watermark extimation through local pixel correlation
Matthew J. Holliman, Nasir D. Memon, Minerva M. Yeung
Author Affiliations +
Proceedings Volume 3657, Security and Watermarking of Multimedia Contents; (1999) https://doi.org/10.1117/12.344664
Event: Electronic Imaging '99, 1999, San Jose, CA, United States
Abstract
Many invisible watermarking schemes can be modeled as the addition of a watermark signal to an image, yielding a watermarked variant perceptually similar to the original image. In this paper, we describe a method by which an attacker, given only an image watermarked with such a technique, can attempt to construct an approximation to the watermark. The technique estimates an embedded signal by taking advantage of the inter-pixel correlation typically found in natural images, thereby allowing for a method of both watermark removal and watermark forgery. Furthermore, the approach is computationally inexpensive, making it suitable for attacks on proposed video watermarking schemes.
© (1999) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Matthew J. Holliman, Nasir D. Memon, and Minerva M. Yeung "Watermark extimation through local pixel correlation", Proc. SPIE 3657, Security and Watermarking of Multimedia Contents, (9 April 1999); https://doi.org/10.1117/12.344664
Lens.org Logo
CITATIONS
Cited by 7 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Sensors

Image quality

Video

Image processing

Image visualization

Visualization

RELATED CONTENT

Spatial synchronization using watermark key structure
Proceedings of SPIE (June 22 2004)
Visual hash for oblivious watermarking
Proceedings of SPIE (May 09 2000)
Low-cost perceptive digital picture watermarking method
Proceedings of SPIE (January 15 1997)
Effect of selected attribute filters on watermarks
Proceedings of SPIE (February 26 2010)
Return of ambiguity attacks
Proceedings of SPIE (April 29 2002)

Back to Top