COUNTERFEITING ATTACKS ON TWO ROBUST WATERMARKING SCHEMES

Zhe-Ming Lu,Xin-Wu Liao
2006-01-01
Abstract:In this paper, we present two attacking methods aiming at two robust water- marking schemes respectively. It is shown that these two robust watermarking schemes have some security problems and are vulnerable to the counterfeiting attack. Specifi- cally, given a watermarked image, one can make a statistical analysis on it to estimate the key parameters used for watermark insertion and forge the corresponding watermark into another image without knowing the secret key and even without explicitly knowing the watermark. In the simulation experiment, we successfully implement the attacks on these two robust watermarking schemes and demonstrate the effectiveness of the proposed counterfeiting attacking schemes.
What problem does this paper attempt to address?