Automatic Recovery of Invisible Image Watermarks from Geometrically Distorted Images

Copyright 2000 Society of Photo-Optical Instrumentation Engineers. This paper was (will be) published in SPIE Proceedings and is made available as an electronic reprint [preprint] with permission of SPIE. Single print or electronic copies for personal use only are allowed. Systematic or multiple reproduction, distribution to multiple locations through an electronic listserver or other electronic means, duplication of any material in this paper for a fee or for commericial purposes, or modification of the content of the pater are all prohibited. By choosing to view or print this document, you agree to all the provisions of the copyright law protecting it.

One method of attacking an imbedded invisible watermark is to create a derivative image that is geometrically distorted relative to the original. One attack, developed at Cambridge University is called "StirMark". Image-distorting methods modify images so subtly that the changes are essentially unnoticeable to a viewer. However, their effect on invisible watermarks can be devastating, rendering them unextractable. In this paper, an automated countermeasure to image-distorting attacks will be described. Employing an unmarked copy of the original image as a reference, the possible distortion in a suspect image is first detected by the method, then measured, and finally reversed, producing a restored image approximately geometrically aligned with the original. Using a robust invisible watermarking method presented previously by one of the authors to produce a watermarked image, "StirMark" to distort the watermarked image, and a copy of the original unmarked image for reference, the restoration method is demonstrated to be sufficient by showing successful extraction of the imbedded watermark from a restored image

By: Gordon W. Braudaway, Fred Mintzer

Published in: SPIE Proceedings, volume 3971, (no ), pages 74-81 in 2000

Please obtain a copy of this paper from your local library. IBM cannot distribute this paper externally.

Questions about this service can be mailed to reports@us.ibm.com .