International Journal of Information Technology and Computer Science(IJITCS)

ISSN: 2074-9007 (Print), ISSN: 2074-9015 (Online)

Published By: MECS Press

IJITCS Vol.11, No.3, Mar. 2019

Attacking Image Watermarking and Steganography - A Survey

Full Text (PDF, 1113KB), PP.23-37

Views:11   Downloads:1


Osama Hosam

Index Terms

Data Hiding;Attacks;Steganography;Watermarking;Steganalysis;Passive attacks;Active Attacks;Geometric;Image enhancement;Image Degradation


Image hiding techniques include steganography and watermarking. Steganography procedures are directed to keep the secure information from eavesdropping and perturbations. On the other hand, watermarking algorithms are used for keeping the watermark robust to attacks. When the attacker tries to perturb the carrier image to remove the watermark, the image quality will be degraded to level that makes it useless. Data hiding is essential in many applications such as communication channel security, data security and forgery detection. Watermarking is used in copyright protection. Image hiding attacks can be active or passive. In active attack, the attacker changes the content of the data. While in passive attacks the attacker tries to guess the secure data by eavesdropping. In this paper, we discuss the image data hiding attacks that directed to both secure message and carrier image. First, message attacks such as Oracle and Template attacks will be discussed. Second, the carrier image attacks are presented in two broad categories, namely passive and active attacks. Finally, the paper conclusion will be presented. The paper presented image data hiding attack types in professional and well-organized categories.

Cite This Paper

Osama Hosam, "Attacking Image Watermarking and Steganography - A Survey", International Journal of Information Technology and Computer Science(IJITCS), Vol.11, No.3, pp.23-37, 2019. DOI: 10.5815/ijitcs.2019.03.03


[1]Cox, I., Miller, M., Bloom, J., Fridrich, J., & Kalker, T. (2007). Digital watermarking and steganography. Morgan Kaufmann.‏

[2]Liu, S., Pan, Z., & Song, H. (2017). Digital image watermarking method based on DCT and fractal encoding. IET Image Processing, 11(10), 815-821.‏

[3]Brandao, A. S., & Jorge, D. C. (2016). Artificial neural networks applied to image steganography. IEEE Latin America Transactions, 14(3), 1361-1366.‏

[4]Fridrich, J., Goljan, M., & Du, R. (2001). Detecting LSB steganography in color, and gray-scale images. IEEE multimedia, 8(4), 22-28.‏

[5]Voloshynovskiy, S., Pereira, S., Pun, T., Eggers, J. J., & Su, J. K. (2001). Attacks on digital watermarks: classification, estimation based attacks, and benchmarks. IEEE communications Magazine, 39(8), 118-126.‏

[6]Hosam, O. (2013). Side-informed image watermarking scheme based on dither modulation in the frequency domain. The Open Signal Processing Journal, 5(1), 1-6.‏

[7]Linnartz, J. P. M., & Van Dijk, M. (1998, April). Analysis of the sensitivity attack against electronic watermarks in images. In International Workshop on Information Hiding (pp. 258-272). Springer, Berlin, Heidelberg.‏

[8]S. Craver et al., "On the Invertibility of Invisible Watermarking Techniques," Proc. IEEE Int'l. Conf, Image Processing 1997, vol. 1, pp. 540-43.

[9]Memon N, Shende S, Wong PW. On the security of the Yeung-Mintzer authentication watermark. Proceedings of the IS & T PICS Symposium; March 1999; Savannah, Ga, USA. pp. 301–306

[10]Tao, H., Chongmin, L., Zain, J. M., & Abdalla, A. N. (2014). Robust image watermarking theories and techniques: A review. Journal of applied research and technology, 12(1), 122-138.‏

[11]Boroumand, M., & Fridrich, J. (2018). Applications of Explicit Non-Linear Feature Maps in Steganalysis. IEEE Transactions on Information Forensics and Security VOL. 13, NO. 4.‏

[12]Sujatha, C. N., & Satyanarayana, P. (2016, April). Analysis of robust watermarking techniques: A retrospective. In Communication and Signal Processing (ICCSP), 2016 International Conference on (pp. 0336-0341). IEEE.‏

[13]Gonzalez, R. C., & Woods, R. E. (2007). Image processing. Digital image processing, 2.‏

[14]Khalid, S. K. A., Deris, M. M., & Mohamad, K. M. (2013). Anti-cropping digital image watermarking using Sudoku. International Journal of Grid and Utility Computing, 4(2-3), 169-177.‏

[15]Hosam, O., & Alraddadi, A. S. (2013). Novel image watermarking technique based on adjacent pixel position switch. Journal of Next Generation Information Technology, 4(3), 81.‏

[16]Preda, R. O., & Vizireanu, D. N. (2015). Watermarking-based image authentication robust to JPEG compression. Electronics Letters, 51(23), 1873-1875.‏

[17]Shih, F. Y. (2017). Digital watermarking and steganography: fundamentals and techniques. second edition, CRC Press.‏

[18]Kutter, M., & Petitcolas, F. A. (1999). A Fair benchmark for image watermarking systems. Security and Watermarking of Multimedia Contents, 3657, 226-239.‏

[19]Chang, Y., & Tai, W. (2013). A block-based watermarking scheme for image tamper detection and self-recovery. Opto-Electronics Review, 21(2), 182-190.‏

[20]Lin, Y. T., Huang, C. Y., & Lee, G. C. (2011). Rotation, scaling, and translation resilient watermarking for images. IET Image Processing, 5(4), 328-340.‏

[21]Hosam, O., & Ben Halima, N. (2016). Adaptive block‐based pixel value differencing steganography. Security and Communication Networks, 9(18), 5036-5050.‏

[22]Ponce, J., Forsyth, D., Willow, E. P., Antipolis-Méditerranée, S., d’activité RAweb, R., Inria, L., & Alumni, I. (2011). Computer vision: a modern approach. Computer, 16(11).‏

[23]Hosam, O., & Alraddadi, A. S. (2013). Novel image watermarking technique based on adjacent pixel position switch. Journal of Next Generation Information Technology, 4(3), 81.‏

[24]Petitcolas, F. A., Anderson, R. J., & Kuhn, M. G. (1998, April). Attacks on copyright marking systems. In International workshop on information hiding (pp. 218-238). Springer, Berlin, Heidelberg.‏

[25]O'Ruanaidh, J. J., & Pereira, S. (1998, September). Secure robust digital image watermark. In Electronic Imaging: Processing, Printing, and Publishing in Color (Vol. 3409, pp. 150-164). International Society for Optics and Photonics.‏

[26]Licks, V., & Jordan, R. (2005). Geometric attacks on image watermarking systems. IEEE multimedia, 12(3), 68-78.‏

[27]Petitcolas, F. A. (1997). Weakness of existing watermarking schemes, ~fapp2/watermarking /image_watermarking/

[28]Behravan, B., & Naghsh, A. (2017, April). Introducing a new method of image reconstruction against crop attack using sudoku watermarking algorithm. In Pattern Recognition and Image Analysis (IPRIA), 2017 3rd International Conference on(pp. 177-181). IEEE.‏

[29]Hearn, D. D., Baker, M. P., & Carithers, W. (2010). Computer graphics with open GL. Prentice Hall Press.‏

[30]Westfeld, A., & Pfitzmann, A. (1999, September). Attacks on steganographic systems. In International workshop on information hiding (pp. 61-76). Springer, Berlin, Heidelberg.‏

[31]Y. Chang, C. Jung, P. Ke, H. Song and J. Hwang, "Automatic Contrast-Limited Adaptive Histogram Equalization With Dual Gamma Correction," in IEEE Access, vol. 6, pp. 11782-11792, 2018.

doi: 10.1109/ACCESS.2018.2797872

[32]P. Liu and Y. Q. Jin, "A Study of Ship Rotation Effects on SAR Image," in IEEE Transactions on Geoscience and Remote Sensing, vol. 55, no. 6, pp. 3132-3144, June 2017. doi: 10.1109/TGRS.2017.2662038

[33]Q. Su, "Novel blind colour image watermarking technique using Hessenberg decomposition," in IET Image Processing, vol. 10, no. 11, pp. 817-829, 11 2016. doi: 10.1049/iet-ipr.2016.0048

[34]A. Girdhar and V. Kumar, "Comprehensive survey of 3D image steganography techniques," in IET Image Processing, vol. 12, no. 1, pp. 1-10, 1 2018. doi: 10.1049/iet-ipr.2017.0162

[35]Chih-Wei Tang and Hsueh-Ming Hang, "A feature-based robust digital image watermarking scheme," in IEEE Transactions on Signal Processing, vol. 51, no. 4, pp. 950-959, Apr 2003. doi: 10.1109/TSP.2003.809367

[36]Juarez-Sandoval, O., Fragoso-Navarro, E., Cedillo-Hernandez, M., Cedillo-Hernandez, A., Nakano, M., & Perez-Meana, H. (2018). improved imperceptible visible watermarking algorithm for auxiliary information delivery. IET Biometrics.‏

[37]Shahdoosti, H. R., & Salehi, M. (2017). Transform-based watermarking algorithm maintaining perceptual transparency. IET Image Processing, 12(5), 751-759.‏

[38]Patiño, A., Altamar, H., & Martínez-Santos, J. C. (2016, August). Speckle free optical watermarking based on pseudo-random phase encoding. In Signal Processing, Images and Artificial Vision (STSIVA), 2016 XXI Symposium on (pp. 1-6). IEEE.‏

[39]Doërr, G., Dugelay, J.L. “Countermeasures for collusion attacks exploiting host signal redundancy” Int. Workshop on Digital Watermarking, 2005, pp.216–230

[40]Y. Fisher, Fractal Image Compression: Theory and Application, editor Springer-Verlag, New York, 1995.

[41]Zhang, Xinpeng, and Shuozhong Wang. "Watermarking scheme capable of resisting sensitivity attack." IEEE Signal Processing Letters 14.2 (2007): 125-128.‏

[42]C. Cachin, ‘‘An information-theoretic model for steganography,’’ in Information Hiding. Berlin, Germany: Springer, 1998, pp. 306–318. [Online]. Available:

[43]Brandao, A. S., & Jorge, D. C. (2016). Artificial neural networks applied to image steganography. IEEE Latin America Transactions, 14(3), 1361-1366.‏

[44]M. Goljan, J. Fridrich, and R. Cogranne, ‘‘Rich model for steganalysis of color images,’’ in Proc. IEEE Int. Workshop Inf. Forensics Secur., Dec. 2015, pp. 185–190

[45]J. Zeng, S. Tan, B. Li, and J. Huang. (Nov. 2016). ‘‘Large-scale JPEG steganalysis using hybrid deep-learning framework.’’ [Online]. Available:

[46]Ye, Jian, Jiangqun Ni, and Yang Yi. "Deep learning hierarchical representations for image steganalysis." IEEE Transactions on Information Forensics and Security 12.11 (2017): 2545-2557.‏

[47]M. Barni, ‘‘Steganography in digital media: Principles, algorithms, and applications (Fridrich, J. 2010) [book reviews],’’ IEEE Signal Process. Mag., vol. 28, no. 5, pp. 142–144, Sep. 2011.

[48]Hu, D., Wang, L., Jiang, W., Zheng, S., & Li, B. (2018). A Novel Image Steganography Method via Deep Convolutional Generative Adversarial Networks. IEEE Access, 6, 38303-38314.‏

[49]Wu, Songtao, Shenghua Zhong, and Yan Liu. "Deep residual learning for image steganalysis." Multimedia tools and applications 77.9 (2018): 10437-10453.‏

[50]Johnson, Neil F., Zoran Duric, and Sushil Jajodia. Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking: Attacks and Countermeasures. Vol. 1. Springer Science & Business Media, 2001.‏

[51]Tanha, M., Torshizi, S. D. S., Abdullah, M. T., & Hashim, F. (2012, June). An overview of attacks against digital watermarking and their respective countermeasures. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on (pp. 265-270). IEEE.‏

[52]Wang, Huaiqing, and Shuozhong Wang. "Cyber warfare: steganography vs. steganalysis." Communications of the ACM 47.10 (2004): 76-82.‏

[53]Pérez-Freire, L., Comesana, P., Troncoso-Pastoriza, J. R., & Pérez-González, F. (2006). Watermarking security: a survey. In Transactions on Data Hiding and Multimedia Security I (pp. 41-72). Springer, Berlin, Heidelberg.‏

[54]Bas, P., & Westfeld, A. (2009, September). Two key estimation techniques for the broken arrows watermarking scheme. In Proceedings of the 11th ACM workshop on Multimedia and security (pp. 1-8). ACM.‏

[55]Mauro Barni, Franco Bartolini, Teddy Furon. A general framework for robust watermarking security. Signal Processing, Elsevier, 2003, 83 (10), pp.2069- 084.

[56]Authors: Bas, P., Furon, T., Cayre, F., Doërr, G., Mathon, B. “Watermarking Security”, Springer, 2016. 

[57]Quiring, E., Arp, D., & Rieck, K. (2018). Forgotten Siblings: Unifying Attacks on Machine Learning and Digital Watermarking. In IEEE European Symposium on Security and Privacy.‏

[58]Song, C., Sudirman, S., Merabti, M., & Llewellyn-Jones, D. (2010, January). Analysis of digital image watermark attacks. In Consumer Communications and Networking Conference (CCNC), 2010 7th IEEE (pp. 1-5). IEEE.‏

[59]Robin David, “LSB-Steganography: Python program to steganography files into images using the Least Significant Bit” [Online-2018]