skip to main content
10.1145/1411328.1411366acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes

Published: 22 September 2008 Publication History

Abstract

Benchmarking watermarking systems now goes beyond only evaluating the ability of the embedded watermark to withstand common signal primitives such as filtering, resampling, lossy compression, D/A-A/D conversions, etc. Evaluation procedures have to consider how much information leaks from a watermarking system since such knowledge could prove most helpful to design very powerful attacks. This paper further refines an attack on dirty paper watermarking schemes which relies on security weaknesses i.e. information leakage. In particular, additional constraints are introduced to be able to handle 'complex' trellises. Moreover, the efficiency of this attack has been evaluated for different trellis configurations. Quite counter-intuitively, increasing the number of states in the trellis seems to enhance both the robustness and the security of the system.

References

[1]
P. Comesaña, L. Pérez-Freire, and F. Pérez-González. Fundamentals of data hiding security and their application to spread-spectrum analysis. In 7th Information Hiding Workshop, IH05, LNCS, Barcelona, Spain, June 2005. Springer Verlag.
[2]
F. Cayre, C. Fontaine, and T. Furon. Watermarking security: theory and practice. IEEE Trans. Signal Processing, 53(10), Oct 2005.
[3]
T. Kalker. Considerations on watermarking security. In Proc. of MMSP, pages 201--206, Cannes, France, October 2001.
[4]
M. Kutter, S. Voloshynovskiy, and A. Herrigel. Watermark copy attack. EI'2000: Security and Watermarking of Multimedia Content II, volume 3971, San Jose, California USA, 23-28 jan 2000.
[5]
T. Furon. A constructive and unifying framework for zero-bit watermarking. IEEE Trans. on Information Forensics and Security, 2(2), June 2007.
[6]
T. Kalker. A security risk for publicly available watermark detectors. In Proc. Benelux Inform. Theory Symp., Veldhoven, The Netherlands, May 1998.
[7]
P. Comesaña, L. Pérez-Freire, and F. Pérez-González. Blind newton sensitivity attack. IEE Proceedings on Information Security, 153(3):115--125, September 2006.
[8]
M. L. Miller, G. J. Doerr, and I. J. Cox. Applying informed coding and embedding to design a robust, high capacity watermark. IEEE Trans. on Image Processing, 6(13):791--807, 2004.
[9]
M. H. M. Costa. Writing on dirty paper. IEEE Transactions on Information Theory, 29(3):439, 1983.
[10]
A. J. Viterbi. CDMA: Principles of Spread Spectrum Communication. Addison-Wesley, pub-AW:adr, 1995.
[11]
P. Bas and G. Doërr. Practical security analysis of dirty paper trellis watermarking. Information Hiding: 9th international workshop, LNCS, Saint-Malo, France, 2007. Springer Verlag, Berlin, Germany.
[12]
J. MacQueen. Some methods for classification and analysis of multivariate observations. In Proc. of the 5th Berkeley Symp. on Mathematics Statistics and Probability, 1967.
[13]
C. Wang, G. Doërr, and I. J. Cox. Toward a better understanding of dirty paper trellis codes. In IEEE Proc. Int. Conf. Acoust, Speech, Signal Processing, volume 2, pages 233--236, 2006.
[14]
C. Wang, G. Doërr, and I. J. Cox. Trellis coded modulation to improve dirty paper trellis watermarking. In Proc. SPIE, January 2007.

Cited By

View all
  • (2020)Image Authentication Using QR Code Watermarking Approach Based on Image Segmentation2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom50675.2020.00217(1572-1577)Online publication date: Dec-2020
  • (2011)Soft-SCS: Improving the Security and Robustness of the Scalar-Costa-Scheme by Optimal Distribution MatchingInformation Hiding10.1007/978-3-642-24178-9_15(208-222)Online publication date: 2011
  • (2009)Two key estimation techniques for the broken arrows watermarking schemeProceedings of the 11th ACM workshop on Multimedia and security10.1145/1597817.1597819(1-8)Online publication date: 7-Sep-2009

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and security
September 2008
242 pages
ISBN:9781605580586
DOI:10.1145/1411328
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 September 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. attack
  2. dirty paper trellis watermarking
  3. security

Qualifiers

  • Research-article

Conference

MM&Sec '08
Sponsor:
MM&Sec '08: Multimedia and Security Workshop
September 22 - 23, 2008
Oxford, United Kingdom

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Image Authentication Using QR Code Watermarking Approach Based on Image Segmentation2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)10.1109/TrustCom50675.2020.00217(1572-1577)Online publication date: Dec-2020
  • (2011)Soft-SCS: Improving the Security and Robustness of the Scalar-Costa-Scheme by Optimal Distribution MatchingInformation Hiding10.1007/978-3-642-24178-9_15(208-222)Online publication date: 2011
  • (2009)Two key estimation techniques for the broken arrows watermarking schemeProceedings of the 11th ACM workshop on Multimedia and security10.1145/1597817.1597819(1-8)Online publication date: 7-Sep-2009

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media