1-2hit |
Wei LU Hongtao LU Fu-Lai CHUNG
This letter describes a permutation attack (PA) to the subsampling-based watermarking scheme where the high correlations between subimages obtained by subsampling the original image are used for watermark embedding. We show that the correlations can also be easily used to attack the watermarking scheme through a simple permutation procedure, while the quality degradation of attacked watermarked image is visually acceptable. Experimental results show the efficiency of the proposed attack algorithm.
Wei LU Fu-Lai CHUNG Hongtao LU
The release of image processing techniques make image modification and fakery easier. Image fakery, here, is defined as a process to copy a region of source image and paste it onto the destination image, with some post processing methods applied, such as boundary smoothing, blurring, etc. to make it natural. The most important characteristic of image fakery is object copy and paste. In order to detect fake images, this letter introduces a blind detection scheme based on singular value decomposition (SVD). Experimental results also show the effectiveness of the proposed scheme.