29 April 2002 Method for hiding synchronization marks in scale- and rotation-resilient watermarking schemes
Author Affiliations +
As concern about watermark robustness grows, different approaches based on the introduction of synchronization marks have been presented to survive geometrical attacks. Most of the proposed techniques rely either on the introduction of a dedicated template either on the detection of particular properties in the autocorrelation function (ACF) of the watermark itself in order to resist against scaling and rotation transformations. The use of this side-information at the detector makes an inversion of the transformation possible. However, due to the publicness of this side-information, those techniques turn out to be very vulnerable to a removal attack. We propose an innovative method to hide the synchronization marks and therefore prevent malicious removal attacks (eg. template attack,...). The ability to detect the synchronization marks will be conditioned by the knowledge of a secret key. The technique consists in using an image dependent secret binary mask to modulate the synchronization pattern before it is introduced in the image. The ability to recover this binary mask upon rotation and scaling allows the detection of the synchronization marks even after transformation. Although mask recovering presents a considerable error rate, sufficient detection of the synchronization marks can be achieved. The mask, obtained from a signal-dependent partition, leads to a spectral spreading of the synchronisation mark, making template attacks nearly impossible to perform.
© (2002) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Damien Delannay, Damien Delannay, Benoit M. M. Macq, Benoit M. M. Macq, } "Method for hiding synchronization marks in scale- and rotation-resilient watermarking schemes", Proc. SPIE 4675, Security and Watermarking of Multimedia Contents IV, (29 April 2002); doi: 10.1117/12.465314; https://doi.org/10.1117/12.465314

Back to Top