David S. Kung
DAC 1998
One method of attacking an imbedded invisible watermark is to create a derivative image that is geometrically distorted relative to the original. One attack, developed at Cambridge University, is called "StirMark."1 Image-distorting methods modify images so subtly that the changes are essentially unnoticeable to a viewer. However, their effect on invisible watermarks can be devastating, rendering them unextractable. In this paper, an automated countermeasure to image-distorting attacks will be described. Employing an unmarked copy of the original image as a reference, the possible distortion in a suspect image is first detected by the method, then measured, and finally reversed, producing a restored image approximately geometrically aligned with the original. Using a robust invisible watermarking method described previously by one of the authors to produce a watermarked image, "StirMark" to distort the watermarked image, and a copy of the original unmarked image for reference, the restoration method is demonstrated to be sufficient by showing successful extraction of the imbedded watermark from a restored image. © 2000 SPIE and IS&T.
David S. Kung
DAC 1998
S.F. Fan, W.B. Yun, et al.
Proceedings of SPIE 1989
N.K. Ratha, A.K. Jain, et al.
Workshop CAMP 2000
Yao Qi, Raja Das, et al.
ISSTA 2009