Abstract
The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum attacking distortion. This paper is intended as a tutorial on this problem, presenting an overview of previous research and introducing a new method based on a general formulation. This new method does not require any knowledge about the detection function nor any other system parameter, but just the binary output of the detector, being suitable for attacking most known watermarking methods. Finally, the soundness of this new approach is tested by attacking several of those methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kalker, T.: Considerations on watermarking security. In: IEEE International Workshop on Multimedia Signal Processing, MMSP 2001, Cannes, France, pp. 201–206 (2001)
Comesaña, P., Pérez–Freire, L., Pérez–González, F.: Fundamentals of data hiding security and their application to Spread–Spectrum analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 146–160. Springer, Heidelberg (2005)
Cox, I.J., Linnartz, J.P.M.G.: Public watermarks and resistance to tampering. In: IEEE International Conference on Image Processing ICIP 1997, Santa Barbara, California, USA, vol. 3, pp. 3–6 (1997)
Cox, I.J., Killian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6, 1673–1687 (1997)
Linnartz, J.P.M.G., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)
Kalker, T., Linnartz, J.P., van Dijk, M.: Watermark estimation through detector analysis. In: IEEE International Conference on Image Processing, ICIP 1998, Chicago, IL, USA, pp. 425–429 (1998)
Mansour, M.F., Tewfik, A.H.: LMS–based attack on watermark public detectors. In: IEEE International Conference on Image Processing, ICIP 2002, vol. 3, pp. 649–652 (2002)
Furon, T., Venturini, I., Duhamel, P.: An unified approach of asymmetric watermarking schemes. In: Delp III, E.J., Wong, P.W. (eds.) and Watermarking of Multimedia Contents III, San Jose, California, USA, vol. 4314, pp. 269–279. SPIE (2001)
Furon, T., Macq, B., Hurley, N., Silvestre, G.: JANIS: Just Another N–order side–Informed watermarking Scheme. In: IEEE International Conference on Image Processing, ICIP 2002, Rochester, NY, USA, vol. 3, pp. 153–156 (2002)
El Choubassi, M., Moulin, P.: New sensitivity analysis attack. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia contents VII, pp. 734–745. SPIE (2005)
Furon, T., Duhamel, P.: An asymmetric watermarking method. IEEE Trans. on Signal Processing 51, 981–995 (2003); Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery
Nocedal, J., Wright, S.J.: Numerical Optimization. Springer, Heidelberg (1999)
Cox, I.J., Miller, M.L., Bloom, J.A.: Digital watermarking. Multimedia Information and Systems. Morgan Kauffman, San Francisco (2002)
Eggers, J.J., Girod, B.: Blind watermarking applied to image authentication. In: Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), vol. 3, pp. 1977–1980 (2001)
Liu, T., Moulin, P.: Error exponents for one–bit watermarking. In: Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), vol. 3, pp. 65–68 (2003)
Pérez–Freire, L., Comesan̈a, P., Pérez–González, F.: Detection in quantizationbased watermarking: performance and security issues. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, vol. 5681, pp. 721–733. SPIE (2005)
Hernández, J.R., Amado, M., Pérez–González, F.: DCT–domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Trans. on Image Processing 9, 55–68 (2000); Special Issue on Image and Video Processing for Digital Libraries
Adelsbach, A., Sadeghi, A.R.: Zero–knowledge watermark detection and proof of ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 273–288. Springer, Heidelberg (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Comesaña, P., Pérez-Freire, L., Pérez-González, F. (2005). The Return of the Sensitivity Attack. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_20
Download citation
DOI: https://doi.org/10.1007/11551492_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28768-1
Online ISBN: 978-3-540-32052-4
eBook Packages: Computer ScienceComputer Science (R0)