首页    期刊浏览 2024年09月30日 星期一
登录注册

文章基本信息

  • 标题:Attacking Image Watermarking and Steganography - A Survey
  • 本地全文:下载
  • 作者:Osama Hosam
  • 期刊名称:International Journal of Information Technology and Computer Science
  • 印刷版ISSN:2074-9007
  • 电子版ISSN:2074-9015
  • 出版年度:2019
  • 卷号:11
  • 期号:3
  • 页码:23-37
  • DOI:10.5815/ijitcs.2019.03.03
  • 出版社:MECS Publisher
  • 摘要:Image hiding techniques include steganography and watermarking. Steganography procedures are directed to keep the secure information from eavesdropping and perturbations. On the other hand, watermarking algorithms are used for keeping the watermark robust to attacks. When the attacker tries to perturb the carrier image to remove the watermark, the image quality will be degraded to level that makes it useless. Data hiding is essential in many applications such as communication channel security, data security and forgery detection. Watermarking is used in copyright protection. Image hiding attacks can be active or passive. In active attack, the attacker changes the content of the data. While in passive attacks the attacker tries to guess the secure data by eavesdropping. In this paper, we discuss the image data hiding attacks that directed to both secure message and carrier image. First, message attacks such as Oracle and Template attacks will be discussed. Second, the carrier image attacks are presented in two broad categories, namely passive and active attacks. Finally, the paper conclusion will be presented. The paper presented image data hiding attack types in professional and well-organized categories.
  • 关键词:Data Hiding;Attacks;Steganography;Watermarking;Steganalysis;Passive attacks;Active Attacks;Geometric;Image enhancement;Image Degradation
国家哲学社会科学文献中心版权所有