Abstract
Multimedia digital data is highly redundant: successive video frames are very similar in a movie clip, most songs contain some repetitive patterns, etc. This property can consequently be exploited to successively replace each part of the signal with a similar one taken from another location in the same signal or with a combination of similar parts. Such an approach is all the more pertinent when video content is considered since such signals exhibit both temporal and spatial self-similarities. To counter such attacking strategies, it is necessary to ensure that embedded watermarks are coherent with the redundancy of the host content. To this end, both motion-compensated watermarking and self-similarities inheritance will be surveyed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Francisco (2001)
DVD Copy Control Association, http://www.dvdcca.org
Secure Digital Music Initiative, http://www.sdmi.org
Su, K., Kundur, D., Hatzinakos, D.: A novel approach to collusion resistant video watermarking. In: Security and Watermarking of Multimedia Contents IV. Proceedings of SPIE, vol. 4675, pp. 491–502 (2002)
Doërr, G., Dugelay, J.L.: Collusion issue in video watermarking. In: Security, Steganography and Watermarking of Multimedia Contents VII. Proceedings of SPIE, vol. 5681, pp. 685–696 (2005)
Cayre, F., Fontaine, C., Furon, T.: Watermarking security, part I: Theory. In: Security, Steganography and Watermarking of Multimedia Contents VII. Proceedings of SPIE, vol. 5681, pp. 746–757 (2005)
Cayre, F., Fontaine, C., Furon, T.: Watermarking security, part II: Practice. In: Security, Steganography and Watermarking of Multimedia Contents VII. Proceedings of SPIE, vol. 5681, pp. 758–768 (2005)
Doërr, G., Dugelay, J.L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Transactions on Signal Processing, Supplement on Secure Media 52, 2955–2964 (2004)
Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66, 283–301 (1998)
Doërr, G., Dugelay, J.L.: A guide tour of video watermarking. Signal Processing: Image Communication, Special Issue on Technologies for Image Security 18, 263–282 (2003)
Doërr, G., Dugelay, J.L.: New intra-video collusion attack using mosaicing. In: Proceedings of the IEEE International Conference on Multimedia and Expo., vol. II, pp. 505–508 (2003)
Doërr, G., Dugelay, J.L.: Secure background watermarking based on video mosaicing. In: Security, Steganography and Watermarking of Multimedia Contents VI. Proceedings of SPIE, vol. 5306, pp. 304–314 (2004)
Smolic, A., Lorei, M., Sikora, T.: Adaptive kalman-filtering for prediction and global motion parameter tracking of segments in video. In: Proceedings of the Picture Coding Symposium (1996)
Nicolas, H., Labit, C.: Motion and illumination variation estimation using a hierarchy of models: Application to image sequence coding. Journal of Visual Communication and Image Representation 6, 303–316 (1995)
Szeliski, R., Shum, H.Y.: Creating full view panoramic image mosaics and environment maps. In: Proceedings of the International Conference on Computer Graphics and Interactive Techniques, pp. 251–258 (1997)
Sun, Z., Tekalp, M.: Trifocal motion modeling for object-based video compression and manipulation. IEEE Journal on Circuits and Systems for Video Technology 8, 667–685 (1998)
Koenen, R.: MPEG-4 overview. In: JTC1/SC29/WG11 N4668, ISO/IEC (2002)
Fisher, Y.: Fractal Image Compression: Theory and Applications. Springer, Heidelberg (1994)
Rey, C., Doërr, G., Dugelay, J.L., Csurka, G.: Toward generic image dewatermarking? In: Proceedings of the IEEE International Conference on Image Processing, vol. III, pp. 633–636 (2002)
Petitcolas, F., Kirovski, D.: The blind pattern matching attack on watermarking systems. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. IV, pp. 3740–3743 (2002)
Kirovski, D., Petitcolas, F.: Blind pattern matching attack on watermarking systems. IEEE Transactions on Signal Processing 51, 1045–1053 (2003)
Kirovski, D., Petitcolas, F.: Replacement attack on arbitrary watermarking systems. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 177–189. Springer, Heidelberg (2003)
Doërr, G., Dugelay, J.L., Grangé, L.: Exploiting self-similarities to defeat digital watermarking systems - a case study on still images. In: Proceedings of the ACM Multimedia and Security Workshop, pp. 133–142 (2004)
Holliman, M., Macy, W., Yeung, M.: Robust frame-dependent video watermarking. In: Security and Watermarking of Multimedia Contents II. Proceedings of SPIE, vol. 3971, pp. 186–197 (2000)
Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceedings of the International Conference on Information Technology: Coding and Computing, pp. 178–183 (2000)
Delannay, D., Macq, B.: A method for hiding synchronization marks in scale and rotation resilient watermarking schemes. In: Security and Watermarking of Multimedia Contents IV. Proceedings of SPIE, vol. 4675, pp. 548–554 (2002)
Irani, M., Anandan, P., Bergen, J., Kumar, R., Hsu, S.: Mosaic representations of video sequences and their applications. Signal Processing: Image Communication 8, 327–351 (1996)
Bas, P., Macq, B.: A new video-object watermarking scheme robust to object manipulation. In: Proceedings of the IEEE International Conference on Image Processing, vol. II, pp. 526–529 (2001)
Hartung, F., Eisert, P., Girod, B.: Digital watermarking of MPEG-4 facial animation parameters. Computers & Graphics 22, 425–435 (1998)
Garcia, E., Dugelay, J.L.: Texture-based watermarking of 3D video objects. IEEE Transactions on Circuits and Systems for Video Technology 13, 853–866 (2003)
Visual Quality Expert Group (VQEG), http://www.vqeg.org
Macy, W., Holliman, M.: Quality evaluation of watermarked video. In: Security and Watermarking of Multimedia Contents II. Proceedings of SPIE, vol. 3971, pp. 486–500 (2000)
Winkler, S., Gelasca, E., Ebrahimi, T.: Towards perceptual metrics for video watermark evaluation. In: Applications of Digital Image Processing. Proceedings of SPIE, vol. 5203, pp. 371–378 (2003)
Doërr, G.: Security Issue and Collusion Attacks in Video Watermarking. PhD thesis, Université de Nice Sophia-Antipolis, France (2005)
Voloshynovskiy, S., Herrigel, A., Baumgärtner, N., Pun, T.: A stochastic approach to content adaptive digital image watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 211–236. Springer, Heidelberg (2000)
Doërr, G., Dugelay, J.L.: How to combat block replacement attacks? In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 161–175. Springer, Heidelberg (2005)
Barni, M., Bartolini, F., De Rosa, A., Piva, A.: A new decoder for optimum recovery of nonadditive watermarks. IEEE Transactions on Image Processing 10, 755–766 (2001)
Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6, 1673–1687 (1997)
Foley, J., Legge, G.: Contrast masking in human vision. Journal of the Optical Society of America 70, 1458–1470 (1980)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Doërr, G., Dugelay, JL. (2005). Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_17
Download citation
DOI: https://doi.org/10.1007/11551492_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28768-1
Online ISBN: 978-3-540-32052-4
eBook Packages: Computer ScienceComputer Science (R0)