COMBATING DESYNCHRONIZATION ATTACKS ON BLIND WATERMARKING SYSTEMS: A MESSAGE PASSING APPROACH

被引:0
|
作者
Sadasivam, Shankar [1 ]
Moulin, Pierre [1 ]
机构
[1] Univ Illinois, Beckman Inst, Coord Sci Lab, Dept ECE, Urbana, IL 61801 USA
关键词
Watermarking; Desynchronization Attacks; Forney-style Factor Graphs; Markov Random Fields;
D O I
10.1109/ICIP.2009.5414272
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We address the question of constructing practical blind watermark decoders that are resilient to scaling and amplitude modulation attacks. We cast the watermark decoding problem as a probabilistic inference problem on a factor graph and solve it via message passing. Our decoder performs nearly as well as a decoder that has exact knowledge of the desynchronization parameters. Experimental results, on both synthetic and natural images, suggest that the decoding algorithm is capable of handling moderate to strong desynchronization attacks very well.
引用
收藏
页码:3641 / +
页数:2
相关论文
共 50 条
  • [41] Gaussian Mixture Message Passing for Blind Known Interference Cancellation
    Wang, Taotao
    Shi, Long
    Zhang, Shengli
    Wang, Hui
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (09) : 4268 - 4282
  • [42] A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems
    Gao, Lijun
    Ma, Maode
    Shu, Yantai
    Wei, Yuhua
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 68 (04) : 1943 - 1959
  • [43] A Blind Audio Watermarking Algorithm Robust Against Synchronization Attacks
    Kaur, Arashdeep
    Dutta, Malay Kishore
    Soni, K. M.
    Taneja, Nidhi
    2013 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC), 2013,
  • [44] Framework for robust blind image watermarking based on classification of attacks
    M. Heidari
    S. Samavi
    S. M. R. Soroushmehr
    S. Shirani
    N. Karimi
    K. Najarian
    Multimedia Tools and Applications, 2017, 76 : 23459 - 23479
  • [45] A blind video watermarking scheme resistant to rotation and collusion attacks
    Karmakar, Amlan
    Phadikar, Amit
    Phadikar, Baisakhi Sur
    Maity, Goutam Kr.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2016, 28 (02) : 199 - 210
  • [46] Framework for robust blind image watermarking based on classification of attacks
    Heidari, M.
    Samavi, S.
    Soroushmehr, S. M. R.
    Shirani, S.
    Karimi, N.
    Najarian, K.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (22) : 23459 - 23479
  • [47] A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems
    Lijun Gao
    Maode Ma
    Yantai Shu
    Yuhua Wei
    Wireless Personal Communications, 2013, 68 : 1943 - 1959
  • [48] An approach to formalization and analysis of message passing libraries
    Palmer, Robert
    DeLisi, Michael
    Gopalakrishnan, Ganesh
    Kirby, Robert M.
    FORMAL METHODS FOR INDUSTRIAL CRITICAL SYSTEMS, 2008, 4916 : 164 - 181
  • [49] Message passing approach for general epidemic models
    Karrer, Brian
    Newman, M. E. J.
    PHYSICAL REVIEW E, 2010, 82 (01)
  • [50] Renaming in message passing systems with Byzantine failures
    Okun, Michael
    Barak, Amnon
    DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, 4167 : 16 - +