David A. Selby
IBM J. Res. Dev
One method of attacking an imbedded invisible watermark is to create a derivative image that is geometrically distorted relative to the original. One attack, developed at Cambridge University, is called "StirMark."1 Image-distorting methods modify images so subtly that the changes are essentially unnoticeable to a viewer. However, their effect on invisible watermarks can be devastating, rendering them unextractable. In this paper, an automated countermeasure to image-distorting attacks will be described. Employing an unmarked copy of the original image as a reference, the possible distortion in a suspect image is first detected by the method, then measured, and finally reversed, producing a restored image approximately geometrically aligned with the original. Using a robust invisible watermarking method described previously by one of the authors to produce a watermarked image, "StirMark" to distort the watermarked image, and a copy of the original unmarked image for reference, the restoration method is demonstrated to be sufficient by showing successful extraction of the imbedded watermark from a restored image. © 2000 SPIE and IS&T.
David A. Selby
IBM J. Res. Dev
Alessandro Morari, Roberto Gioiosa, et al.
IPDPS 2011
B.K. Boguraev, Mary S. Neff
HICSS 2000
Chi-Leung Wong, Zehra Sura, et al.
I-SPAN 2002