CWAN: Covert Watermarking Attack Network
Abstract
:1. Introduction
- (1)
- Applying deep learning techniques to the field of digital watermarking attacks, combining digital watermarking attack techniques with convolutional neural network denoising methods, extracting the features of low-frequency watermark information in WMI using deep CNN, attacking watermark information while removing noise from noise-containing WMI using CNN, and achieving the purpose of removing noise and watermark information at the same time.
- (2)
- The method proposed in this paper is a novel and effective method for digital watermarking attacks due to neural networks’ powerful learning and reconstruction capabilities. Attacks on watermarked information are significantly more effective than traditional image processing and geometric attacks.
- (3)
- Improving the shortcomings of the traditional digital watermarking attack methods, namely, that the traditional attack causes varying degrees of distortion and damage to the image while removing the watermark information. The proposed attack method produces a highly imperceptible attack on the image and maximizes the preservation of image details, textures, etc.
- (4)
- Compared with the traditional watermarking attack method and neural network watermarking attack method DnCNN and FCNNDA, we not only improve the attack performance metrics but also significantly improve the remaining performance evaluation metrics.
2. Related Works
3. Attacked Robust Watermark Algorithm
4. Proposed Watermarking Attack Method
4.1. Details of CWAN
4.2. Loss Function and Performance Evaluation Indicators
5. Experiment
5.1. Comparison with Other Methods
5.2. Attack Effect on Image Watermarks of Different Sizes
5.2.1. Effectiveness of Attack Network on Image Watermark of Size 32 × 32
5.2.2. Effectiveness of Attack Network on Image Watermark of Size 8 × 8
6. Conclusions and Future Work
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Kadian, P.; Arora, S.; Arora, N. Robust Digital Watermarking Techniques for Copyright Protection of Digital Data: A Survey. Wirel. Pers. Commun. 2021, 118, 3225–3249. [Google Scholar] [CrossRef]
- Vassaux, B.; Nguyen, P.; Baudry, S.; Bas, P.; Chassery, J.-M. Survey on attacks in image and video watermarking. In International Society for Optics and Photonics; SPIE: Philadelphia, PA, USA, 2002; pp. 169–179. [Google Scholar]
- Licks, V.; Jordan, R. Geometric attacks on image watermarking systems. IEEE Multimed. 2005, 12, 68–78. [Google Scholar] [CrossRef]
- Song, C.; Sudirman, S.; Merabti, M.; Llewellyn-Jones, D. Analysis of Digital Image Watermark Attacks. In Proceedings of the 2010 7th IEEE Con-sumer Communications and Networking Conference, Las Vegas, NV, USA, 9–12 January 2010; pp. 1–5. [Google Scholar]
- Hua, G.; Xiang, Y.; Zhang, L. Informed histogram-based watermarking. IEEE Signal Process. Lett. 2020, 27, 236–240. [Google Scholar] [CrossRef]
- Zong, T.; Xiang, Y.; Natgunanathan, I.; Guo, S.; Zhou, W.; Beliakov, G. Robust histogram shape-based method for image water marking. IEEE Trans. Circuits Syst. Video Technol. 2014, 25, 717–729. [Google Scholar] [CrossRef]
- Shen, Y.; Tang, C.; Xu, M.; Chen, M.; Lei, Z. A DWT-SVD based adaptive color multi-watermarking scheme for copyright protec-tion using AMEF and PSO-GWO. Expert Syst. Appl. 2021, 168, 114414. [Google Scholar] [CrossRef]
- Liu, X.; Han, G.; Wu, J.; Shao, Z.; Coatrieux, G.; Shu, H. Fractional Krawtchouk transform with an application to image watermarking. IEEE Trans. Signal Process. 2017, 65, 1894–1908. [Google Scholar] [CrossRef]
- Hu, R.; Xiang, S. Cover-Lossless Robust Image Watermarking Against Geometric Deformations. IEEE Trans. Image Process. 2020, 30, 318–331. [Google Scholar] [CrossRef] [PubMed]
- Wang, C.; Ma, B.; Xia, Z.; Li, J.; Li, Q.; Shi, Y.-Q. Stereoscopic Image Description with Trinion Fractional-Order Continuous Or-thogonal Moments. IEEE Trans. Circuits Syst. Video Technol. 2022, 32, 1998–2012. [Google Scholar] [CrossRef]
- Haribabu, K.; Subrahmanyam, G.; Mishra, D. A robust digital image watermarking technique using auto encoder based convolutional neural networks. In Proceedings of the 2015 IEEE Workshop on Computational Intelligence: Theories, Applications and Future Di-rections (WCI), Kanpur, India, 14–17 December 2015; pp. 1–6. [Google Scholar]
- Zhu, J.; Kaplan, R.; Johnson, J.; Fei-Fei, L. Hidden: Hiding data with deep networks. In Proceedings of the European Conference on Computer Vision (ECCV), Munich, Germany, 8–14 September 2018; pp. 657–672. [Google Scholar]
- Ahmadi, M.; Norouzi, A.; Karimi, N.; Samavi, S.; Emami, A. ReDMark: Framework for residual diffusion watermarking based on deep networks. Expert Syst. Appl. 2020, 146, 113157. [Google Scholar] [CrossRef]
- Lee, J.-E.; Seo, Y.-H.; Kim, D.-W. Convolutional Neural Network-Based Digital Image Watermarking Adaptive to the Resolution of Image and Watermark. Appl. Sci. 2020, 10, 6854. [Google Scholar] [CrossRef]
- Geng, L.; Zhang, W.; Chen, H.; Fang, H.; Yu, N. Real-time attacks on robust watermarking tools in the wild by CNN. J. Real-Time Image Process. 2020, 17, 631–641. [Google Scholar] [CrossRef]
- Hatoum, M.; Couchot, J.-F.; Couturier, R.; Darazi, R. Using Deep learning for image watermarking attack. Signal Process. Image Commun. 2021, 90, 116019. [Google Scholar] [CrossRef]
- Chen, Y.; Bai, Y.; Zhang, W.; Mei, T. Destruction and Construction Learning for Fine-Grained Image Recognition. In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Long Beach, CA, USA, 16–17 June 2019. [Google Scholar]
- Wang, C.; Wang, X.; Xia, Z.; Ma, B.; Shi, Y.-Q. Image description with polar harmonic Fourier moments. IEEE Trans. Circuits Syst. Video Technol. 2020, 30, 4440–4452. [Google Scholar] [CrossRef]
- Mun, S.-M.; Nam, S.-H.; Jang, H.; Kim, D.; Lee, H.-K. Finding robust domain from attacks: A learning framework for blind water-marking. Neurocomputing 2019, 337, 191–202. [Google Scholar] [CrossRef] [Green Version]
- Wang, C.; Wang, X.; Xia, Z.; Zhang, C. Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Inf. Sci. 2019, 470, 109–120. [Google Scholar] [CrossRef]
- Xia, Z.; Wang, X.; Zhou, W.; Li, R.; Wang, C.; Zhang, C. Color medical image lossless watermarking using chaotic system and accurate quaternion polar harmonic transforms. Signal Process. 2019, 157, 108–118. [Google Scholar] [CrossRef]
- He, B.; Cui, J.; Xiao, B.; Peng, Y. Image analysis using modified exponent-Fourier moments. EURASIP J. Image Video Process. 2019, 2019, 72. [Google Scholar] [CrossRef] [Green Version]
- Wang, C.; Hao, Q.; Xu, S.; Ma, B.; Xia, Z.; Li, Q.; Li, J.; Shi, Y.-Q. RD-IWAN: Residual Dense based Imperceptible Watermark Attack Network. IEEE Trans. Circuits Syst. Video Technol. 2022, 32, 7460–7472. [Google Scholar] [CrossRef]
- Li, Q.; Wang, X.; Ma, B.; Wang, X.; Wang, C.; Gao, S.; Shi, Y.-Q. Concealed attack for robust watermarking based on generative model and perceptual loss. IEEE Trans. Circuits Syst. Video Technol. 2022, 32, 5695–5706. [Google Scholar] [CrossRef]
Attack | PSNR (dB) | SSIM | BER |
---|---|---|---|
WMI | - | - | - |
JPEG 10 [4] | 28.2991 | 0.7908 | 0.1094 |
Gaussian noise 0.0005 [4] | 23.0334 | 0.4733 | 0.0508 |
Salt & pepper noise 0.01 [4] | 25.1640 | 0.7988 | 0.0234 |
Median filter 5 [4] | 28.6722 | 0.8415 | 0.1211 |
Speckle noise 0.01 [4] | 26.9181 | 0.6833 | 0.0039 |
DnCNN [15] | 20.3051 | 0.4956 | 0.1736 |
FCNNDA [16] | 29.0245 | 0.7637 | 0.1609 |
Our method | 30.3979 | 0.8485 | 0.1797 |
Attack | PSNR (dB) | SSIM | BER |
---|---|---|---|
WMI | - | - | - |
JPEG 10 [4] | 28.0461 | 0.7696 | 0.1504 |
Gaussian noise 0.0005 [4] | 23.0342 | 0.4957 | 0.0889 |
Salt & pepper noise 0.01 [4] | 25.3781 | 0.8128 | 0.0508 |
Median filter 5 [4] | 28.3594 | 0.8102 | 0.1992 |
Speckle noise 0.01 [4] | 26.9106 | 0.7057 | 0.0342 |
DnCNN [15] | 20.3096 | 0.5076 | 0.1807 |
FCNNDA [16] | 27.2243 | 0.7453 | 0.1523 |
Our method | 29.8257 | 0.8178 | 0.2119 |
Attack | PSNR (dB) | SSIM | BER |
---|---|---|---|
WMI | - | - | - |
JPEG 10 [4] | 28.3582 | 0.7934 | 0.0938 |
Gaussian noise 0.0005 [4] | 23.0057 | 0.4677 | 0.1094 |
Salt & pepper noise 0.01 [4] | 25.2494 | 0.7930 | 0.0156 |
Median filter 5 [4] | 28.7087 | 0.8420 | 0.0625 |
Speckle noise 0.01 [4] | 26.9325 | 0.6780 | 0.0156 |
DnCNN [15] | 15.1509 | 0.2740 | 0.1956 |
FCNNDA [16] | 28.4396 | 0.7989 | 0.1126 |
Our method | 29.5310 | 0.8297 | 0.1719 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wang, C.; Liu, Y.; Xia, Z.; Li, Q.; Li, J.; Wang, X.; Ma, B. CWAN: Covert Watermarking Attack Network. Electronics 2023, 12, 303. https://doi.org/10.3390/electronics12020303
Wang C, Liu Y, Xia Z, Li Q, Li J, Wang X, Ma B. CWAN: Covert Watermarking Attack Network. Electronics. 2023; 12(2):303. https://doi.org/10.3390/electronics12020303
Chicago/Turabian StyleWang, Chunpeng, Yushuo Liu, Zhiqiu Xia, Qi Li, Jian Li, Xiaoyu Wang, and Bin Ma. 2023. "CWAN: Covert Watermarking Attack Network" Electronics 12, no. 2: 303. https://doi.org/10.3390/electronics12020303
APA StyleWang, C., Liu, Y., Xia, Z., Li, Q., Li, J., Wang, X., & Ma, B. (2023). CWAN: Covert Watermarking Attack Network. Electronics, 12(2), 303. https://doi.org/10.3390/electronics12020303