[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1022431.1022455acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
Article

Exploiting self-similarities to defeat digital watermarking systems: a case study on still images

Published: 20 September 2004 Publication History

Abstract

Unauthorized digital copying is a major concern for multi-media content providers. Since copyright owners lose control over content distribution as soon as data is decrypted or unscrambled, digital watermarking has been introduced as a complementary protection technology. In an effort to anticipate hostile behaviors of adversaries, the research community is constantly introducing novel attacks to benchmark watermarking systems. In this paper, a generic block replacement attack will be presented. The underlying assumption is that multimedia content is highly repetitive. It should consequently be possible to exploit the self-similarities of the signal to replace each signal block with another perceptually similar one. Alternative methods to compute such a valid placement block will be surveyed in this paper. Then,experimental results on still images will be presented to the efficiency of the presented attack in comparison with other reference image processing operations. Finally, a will be conducted to exhibit the properties that a watermark should have to resist to this attack.

References

[1]
S. Byers, L. Cranor, D. Korman, P. McDaniel,and E. Cronin. Analysis of security vulnerabilities in the movie production and distribution process. In Proceedings of the ACM Workshop on Digital Rights Management pages 1--12,October 2003.]]
[2]
Certimark. http://www.certimark.org.]]
[3]
Checkmark. http://watermarking.unige.ch/checkmark.]]
[4]
H. Cohen. A Course in Computational Algebraic Number Theory Springer-Verlag, 1993.]]
[5]
I. Cox and M. Miller. Preprocessing media to facilitate later insertion of a watermark. In Proceedings of the International Conference on Digital Signal Processing volume 1, pages 67--70, July 2002.]]
[6]
I. Cox, M. Miller, and J. Bloom. Digital Watermarking Morgan Kaufmann Publishers, 2001.]]
[7]
G. Doërr and J.-L. Dugelay. New intra-video collusion attack using mosaicing. In Proceedings of the IEEE International Conference on Multimedia and Expo volume II, pages 505--508, July 2003.]]
[8]
G. Doërr and J.-L. Dugelay. Secure background watermarking based on video mosaicing. In Security, Steganography and Watermarking of Multimedia Contents VI volume 5306 of Proceedings of SPIE January 2004.]]
[9]
G. Doërr and J.-L. Dugelay. Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Transactions on Signal Processing, Supplement on Secure Media October 2004.]]
[10]
DVD Copy Control Association.http://www.dvdcca.org.]]
[11]
Y. Fisher. Fractal Image Compression: Theory and Applications Springer-Verlag, 1994.]]
[12]
M. Gharavi-Alkhansari and T. Huang. A fractal-based image block-coding algorithm. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing volume V, pages 345--348, April 1993.]]
[13]
F. Hartung, J. Su, and B. Girod. Spread spectrum watermarking: Malicious attacks and counterattacks. In Security and Watermarking of Multimedia Contents volume 3657 of Proceedings of SPIE pages 147--158, January 1999.]]
[14]
A. Herrigel, S. Voloshynovskiy, and Y. Rytsar. The watermark template attack. In Security and Watermarking of Multimedia Contents III volume 4314 of Proceedings of SPIE pages 394--405, January 2001.]]
[15]
M. Holliman, W. Macy, and M. Yeung. Robust frame-dependent video watermarking. In Security and Watermarking of Multimedia Contents II volume 3971 of Proceedings of SPIE pages 186--197, January 2000.]]
[16]
A. Jacquin. A novel fractal block-coding technique for digital images. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing volumeIV, pages 2225--2228, April 1990.]]
[17]
I. Jolliffe. Principal Component Analysis Springer-Verlag, 1986.]]
[18]
JPEG Standard. Digital compression and coding of continuous-tone still images. In JTC1/SC29/WG1 10918-1 ISO/IEC, February 1994.]]
[19]
D. Kirovski and H. Malvar. Robust covert communication over a public audio channel using spread spectrum. In Proceedings of the Fourth International Workshop on Information Hiding volume 2137 of Lecture Notes on Computer Science pages 354--368, April 2001.]]
[20]
D. Kirovski and F. Petitcolas. Blind pattern matching attack on watermarking systems. IEEE Transactions on Signal Processing 51(4):1045--1053, April 2003.]]
[21]
D. Kirovski and F. Petitcolas. Replacement attack on arbitrary watermarking systems. In Proceedings of the ACM Digital Rights Management Workshop volume 2696 of Lecture Notes on Computer Science pages 177--189, July 2003.]]
[22]
M. Kutter. Watermarking resisting to translation, rotation and scaling. In Multimedia Systems and Applications volume 3528 of Proceedings of SPIE pages 423--431, November 1998.]]
[23]
M. Kutter and F. Petitcolas. A fair benchmark for image watermarking systems. In Security and Watermarking of Multimedia Contents volume 3657 of Proceedings of SPIE pages 226--239, January 1999.]]
[24]
G. Langelaar, R. Lagendijk, and J. Biemond. Removing spatial spread spectrum watermarks by nonlinear filtering. In Proceedings of the European Signal Processing Conference volume IV, pages 2281--2284, September 1998.]]
[25]
G. Øien,S. Lepsøy, and T. Ramstad. An inner product space approach to image coding by contractive transformations. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing volume III, pages 2773--2776, May 1991.]]
[26]
OpenWatermark. http://www.openwatermark.org.]]
[27]
Optimark. http://poseidon.csd.auth.gr/optimark.]]
[28]
J. Ó Ruanaidh and T. Pun. Rotation,scale and translation invariant digital image watermarking. Signal Processing 68(3):303--317, May 1998.]]
[29]
F. Petitcolas, R. Anderson, and M. Kuhn. Attacks on copyright marking systems. In Proceedings of the Second International Workshop on Information Hiding volume 1525 of Lecture Notes on Computer Science pages 219--239, April 1998.]]
[30]
F. Petitcolas and D. Kirovski. The blind pattern matching attack on watermarking systems. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing volume IV, pages 3740--3743, May 2002.]]
[31]
C. Rey. Tatouage d'Images: Gain en Robustesse et Intégrité des Images PhD thesis, Université d 'Avignon, France, February 2003.]]
[32]
C. Rey,G. Doërr, J.-L. Dugelay, and G. Csurka. Toward generic image dewatermarking? In Proceedings of the IEEE International Conference on Image Processing volume III, pages 633--636, September 2002.]]
[33]
P. Sallee. Model-based steganography. In Proceedings of the Second International Workshop on Digital Watermarking volume 2939 of Lecture Notes in Computer Science pages 154--167, October 2003.]]
[34]
Secure Digital Music Initiative. http://www.sdmi.org.]]
[35]
Stirmark. http://www.petitcolas.net/fabien/watermarking/stirmark.]]
[36]
J. Su and B. Girod. Power-spectrum condition for energy-efficient watermarking. IEEE Transactions on Multimedia 4(4):551--560, December 2002.]]
[37]
S. Voloshynovskiy, S. Pereira, A. Herrigel, N. Baumgärtner, and T. Pun. Generalized watermarking attack based on watermark estimation and perceptual remodulation. In Security and Watermarking of Multimedia Contents II volume 3971 of Proceedings of SPIE pages 358--370, January 2000.]]
[38]
S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun. Attack modeling: Towards a second generation watermarking benchmark. Signal Processing 81(6):1177--1214, June 2001.]]
[39]
Watermark Evaluation Testbed (WET). Contact Professor E. Delp, Purdue University, USA.]]
[40]
M. Wu and B. Liu. Attacks on digital watermarks. In Proceedings of 33th Asilomar Conference on Signals, Systems, and Computers volume II, pages 1508--1512, October 1999.]]

Cited By

View all
  • (2013)Partial encryption and watermarking scheme for audio files with controlled degradation of qualityMultimedia Tools and Applications10.1007/s11042-011-0969-964:3(649-669)Online publication date: 1-Jun-2013
  • (2011)Game-Theoretic Strategies and Equilibriums in Multimedia Fingerprinting Social NetworksIEEE Transactions on Multimedia10.1109/TMM.2010.210234513:2(191-205)Online publication date: 1-Apr-2011
  • (2010)Impact of Social Network Structure on Multimedia Fingerprinting Misbehavior Detection and IdentificationIEEE Journal of Selected Topics in Signal Processing10.1109/JSTSP.2010.20512564:4(687-703)Online publication date: Aug-2010
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MM&Sec '04: Proceedings of the 2004 workshop on Multimedia and security
September 2004
236 pages
ISBN:1581138547
DOI:10.1145/1022431
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 September 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. block replacement attack
  2. intra-signal collusion
  3. self-similarities

Qualifiers

  • Article

Conference

MM&Sec '04
Sponsor:
MM&Sec '04: Multimedia and Security Workshop 2004
September 20 - 21, 2004
Magdeburg, Germany

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 31 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2013)Partial encryption and watermarking scheme for audio files with controlled degradation of qualityMultimedia Tools and Applications10.1007/s11042-011-0969-964:3(649-669)Online publication date: 1-Jun-2013
  • (2011)Game-Theoretic Strategies and Equilibriums in Multimedia Fingerprinting Social NetworksIEEE Transactions on Multimedia10.1109/TMM.2010.210234513:2(191-205)Online publication date: 1-Apr-2011
  • (2010)Impact of Social Network Structure on Multimedia Fingerprinting Misbehavior Detection and IdentificationIEEE Journal of Selected Topics in Signal Processing10.1109/JSTSP.2010.20512564:4(687-703)Online publication date: Aug-2010
  • (2009)Behavior forensics with side information for multimedia fingerprinting social networksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2009.20332244:4(911-927)Online publication date: 1-Dec-2009
  • (2009)Behavior modeling and forensics for multimedia social networksIEEE Signal Processing Magazine10.1109/MSP.2008.93064826:1(118-139)Online publication date: Jan-2009
  • (2006)Behavior forensics for scalable multiuser collusionIEEE Transactions on Information Forensics and Security10.1109/TIFS.2006.8792791:3(311-329)Online publication date: 1-Sep-2006
  • (2005)How to combat block replacement attacks?Proceedings of the 7th international conference on Information Hiding10.1007/11558859_13(161-175)Online publication date: 6-Jun-2005
  • (2005)Countermeasures for collusion attacks exploiting host signal redundancyProceedings of the 4th international conference on Digital Watermarking10.1007/11551492_17(216-230)Online publication date: 15-Sep-2005

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media