Abstract
In this paper we present a cryptanalysis of the generalized patchwork algorithm under the assumption that the attacker possesses only a single copy of the watermarked image. In the scheme, watermark is inserted by modifying randomly chosen DCT values in each block of the original image. Towards the attack we first fit low degree polynomials (which minimize the mean square error) on the data available from each block of the watermarked content. Then we replace the corresponding DCT data of the attacked image by the available data from the polynomials to construct an attacked image. The technique nullifies the modification achieved during watermark embedding. Experimental results show that recovery of the watermark becomes difficult after the attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R.J., Petitcolas, F.A.P.: On the limits of steganography. IEEE Journal of Selected Areas in Communications. Special Issue on Copyright and Privacy 16(4), 474–481 (1998)
Boeuf, J., Stern, J.P.: An analysis of one of the SDMI candidates. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 395–410. Springer, Heidelberg (2001)
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6(12), 1673–1687 (1997)
Das, T.K., Maitra, S., Mitra, J.: Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme. IEEE Transactions on Signal Processing, PART II 53(2), 768–775 (2005)
Das, T.K., Maitra, S.: Cryptanalysis of correlation based watermarking schemes using single watermarked copy. IEEE Signal Processing Letters 11(4), 446–449 (2004)
Ergun, F., Kilian, J., Kumar, R.: A note on the limits of collusion-resistant watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 140–149. Springer, Heidelberg (1999)
Kalker, T., Linnartz, J.P.M.G., Dijk, M.v.: Watermark estimation through detector analysis. In: International Conference on Image Processing (1998)
Kerckhoffs, A.: La cryptographie militaire. Journal des Sciences Militaires, 9th series, IX, pp. 5–38 (January 1883), and pp. 161–191 (February 1883)
Kirovski, D., Malvar, H.S.: Embedding and detecting spread-spectrum watermarks under the estimation attack. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (2002)
Kirovski, D., Petitcolas, F.A.P.: Replacement attack on arbitrary watermarking systems. In: ACM Workshop on Digital Rights Management (2002)
Mihcak, M.K., Venkatesan, R., Kesal, M.: Cryptanalysis of discrete-sequence spread spectrum watermarks. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 226–246. Springer, Heidelberg (2003)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G., Aucsmith, D.: Attacks on copyright marking systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 218–238. Springer, Heidelberg (1998)
Petitcolas, F.A.P., Anderson, R.J.: Evaluation of copyright marking systems. In: IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, June 1999, vol. 1, pp. 574–579 (1999)
Yeo, I.-K., Kim, H.J.: Generalized patchwork algorithm for image watermarking. Multimedia Systems 9, 261–265 (2003)
Yeo, I.-K., Kim, H.J.: Modified patchwork algorithm: A novel audio watermarking scheme. IEEE Transactions on Speech and Audio Processing 11(4), 381–386 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Das, T.K., Kim, H.J., Maitra, S. (2005). Security Evaluation of Generalized Patchwork Algorithm from Cryptanalytic Viewpoint. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3681. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11552413_177
Download citation
DOI: https://doi.org/10.1007/11552413_177
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28894-7
Online ISBN: 978-3-540-31983-2
eBook Packages: Computer ScienceComputer Science (R0)