Skip to main content

Security Evaluation of Generalized Patchwork Algorithm from Cryptanalytic Viewpoint

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Abstract

In this paper we present a cryptanalysis of the generalized patchwork algorithm under the assumption that the attacker possesses only a single copy of the watermarked image. In the scheme, watermark is inserted by modifying randomly chosen DCT values in each block of the original image. Towards the attack we first fit low degree polynomials (which minimize the mean square error) on the data available from each block of the watermarked content. Then we replace the corresponding DCT data of the attacked image by the available data from the polynomials to construct an attacked image. The technique nullifies the modification achieved during watermark embedding. Experimental results show that recovery of the watermark becomes difficult after the attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE Journal of Selected Areas in Communications. Special Issue on Copyright and Privacy 16(4), 474–481 (1998)

    Article  Google Scholar 

  2. Boeuf, J., Stern, J.P.: An analysis of one of the SDMI candidates. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 395–410. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6(12), 1673–1687 (1997)

    Article  Google Scholar 

  4. Das, T.K., Maitra, S., Mitra, J.: Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme. IEEE Transactions on Signal Processing, PART II 53(2), 768–775 (2005)

    Article  MathSciNet  Google Scholar 

  5. Das, T.K., Maitra, S.: Cryptanalysis of correlation based watermarking schemes using single watermarked copy. IEEE Signal Processing Letters 11(4), 446–449 (2004)

    Article  Google Scholar 

  6. Ergun, F., Kilian, J., Kumar, R.: A note on the limits of collusion-resistant watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 140–149. Springer, Heidelberg (1999)

    Google Scholar 

  7. Kalker, T., Linnartz, J.P.M.G., Dijk, M.v.: Watermark estimation through detector analysis. In: International Conference on Image Processing (1998)

    Google Scholar 

  8. Kerckhoffs, A.: La cryptographie militaire. Journal des Sciences Militaires, 9th series, IX, pp. 5–38 (January 1883), and pp. 161–191 (February 1883)

    Google Scholar 

  9. Kirovski, D., Malvar, H.S.: Embedding and detecting spread-spectrum watermarks under the estimation attack. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (2002)

    Google Scholar 

  10. Kirovski, D., Petitcolas, F.A.P.: Replacement attack on arbitrary watermarking systems. In: ACM Workshop on Digital Rights Management (2002)

    Google Scholar 

  11. Mihcak, M.K., Venkatesan, R., Kesal, M.: Cryptanalysis of discrete-sequence spread spectrum watermarks. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 226–246. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G., Aucsmith, D.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 218–238. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  13. Petitcolas, F.A.P., Anderson, R.J.: Evaluation of copyright marking systems. In: IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, June 1999, vol. 1, pp. 574–579 (1999)

    Google Scholar 

  14. Yeo, I.-K., Kim, H.J.: Generalized patchwork algorithm for image watermarking. Multimedia Systems 9, 261–265 (2003)

    Article  Google Scholar 

  15. Yeo, I.-K., Kim, H.J.: Modified patchwork algorithm: A novel audio watermarking scheme. IEEE Transactions on Speech and Audio Processing 11(4), 381–386 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Das, T.K., Kim, H.J., Maitra, S. (2005). Security Evaluation of Generalized Patchwork Algorithm from Cryptanalytic Viewpoint. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3681. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552413_177

Download citation

  • DOI: https://doi.org/10.1007/11552413_177

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28894-7

  • Online ISBN: 978-3-540-31983-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics