首页 | 本学科首页   官方微博 | 高级检索  
     检索      

对于抗敏感性攻击水印的强化攻击
引用本文:张新鹏,王朔中,周振宇.对于抗敏感性攻击水印的强化攻击[J].东南大学学报(自然科学版),2007,37(A01):53-57.
作者姓名:张新鹏  王朔中  周振宇
作者单位:上海大学通信与信息工程学院,上海200072
基金项目:国家自然科学基金资助项目(60502039)、上海市青年科技启明星计划资助项目(06QA14022).
摘    要:指出一种可抵抗敏感性攻击的水印方案仍然存在安全漏洞,攻击者对2个不同的临界信号分别实施敏感性攻击得到2个估计信号,然后将这2个信号做和或做差,便可得到有效的攻击信号,在含水印的媒体内容中迭加此攻击信号,便可去除合法水印,即使进一步改进水印方案、增加模板数量来增强水印安全性,攻击者依然可以通过多次尝试获得有效的攻击信号,进而删除水印,实验结果表明这种增强的敏感性攻击方法可以在保持高视觉质量的条件下去除水印。

关 键 词:数字水印  敏感性攻击  水印检测器
文章编号:1001-0505(2007)增刊(Ⅰ)-0053-05
收稿时间:2007-07-20

Enhanced sensitivity attack on watermarking scheme with anti-attack capability
Zhang Xinpeng Wang Shuozhong Zhou Zhenyu.Enhanced sensitivity attack on watermarking scheme with anti-attack capability[J].Journal of Southeast University(Natural Science Edition),2007,37(A01):53-57.
Authors:Zhang Xinpeng Wang Shuozhong Zhou Zhenyu
Abstract:It is pointed out that a loophole still exists in a watermarking scheme capable of resisting sensitivity attack. After performing the sensitivity attacks on two different constructed signals close to the decision boundary and gaining two estimated signals, the attacker may add/subtract an estimated signal into/ from another one to obtain an effective attack signal. By adding the attack signal into a legal watermarked content with a suitable strength, the embedded watermark can be removed. Even if numerous templates are introduced to improve the security of watermarking system, careful attempts for constructing two similar signals close to the decision boundary can still achieve an effective attack signal that can destroy the embedded watermark. Experimental results show that the embedded watermarks can be deleted when keeping a high perceptual quality of digital image.
Keywords:digital watermarking  sensitivity attack  watermark detector
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号