This paper presents two different key estimation attacks targeted for the image watermarking system proposed for the BOWS-2 contest. Ten thousands images are used in order to estimate the secret key and remove the watermark while minimizing the distortion. Two different techniques are proposed. The first one combines a regression-based denoising process to filter out the component of the original images and a clustering algorithm to compute the different components of the key. The second attack is based on an inline subspace estimation algorithm, which estimates the subspace associated with the secret key without computing eigen decomposition. The key components are then estimated using Independent Component Analysis and a strategy designed to leave efficiently the detection region is presented. On six test images, the two attacks are able to remove the mark with very small distortions (between 41.8 dB and 49 dB).
Categories and Subject Descriptors
General TermsSecurity, Algorithms Keywords Zero-bit watermarking algorithm , Security, Attack, Subspace Estimation
INTRODUCTIONIf watermarking robustness deals with the performance of a watermarking scheme against common processing operations (re-compression, transcoding, editing operations), the Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. security of a watermarking scheme is addressed whenever an adversary is part of the game and tries to remove the watermark. There are two important families of security attacks:• Sensitivity attacks [1] aim at removing the watermark by using the watermark detector as an oracle,