Skip to main content

A Time Series Intra-Video Collusion Attack on Frame-by-Frame Video Watermarking

  • Conference paper
Digital Watermarking (IWDW 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5450))

Included in the following conference series:

  • 1739 Accesses

Abstract

Current methods of digital watermarking for video rely on results from digital watermarking for images. However, watermarking each frame using image watermarking techniques is vulnerable to an intra-video collusion attack because it provides grounds to make statistical inference about information within consecutive frames. An algorithm using bootstrapped time series is proposed to exploit this vulnerability. Experimental results demonstrate that this algorithm produces a video with a significantly lower similarity to the given watermarked video using the standard watermark detector.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Behseta, S., Lam, C., Webb, R.L.: A Bootstrap Attack on Digital Watermarks in the Frequency Domain. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 361–375. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  2. Cannons, J., Moulin, P.: Design and Statistical Analysis of a Hash-Aided Image Watermarking System. IEEE Trans. Image Processing 13(10), 1393–1408 (2004)

    Article  Google Scholar 

  3. Chemak, C., Bouhlel, M.-S., Lapayre, J.-C.: New Watermarking Scheme for Security and Transmission of Medical Images for PocketNeuro Project. In: Spolecnost Pro Radioelektronicke Inzenyrstvi, pp. 58–63 (2007)

    Google Scholar 

  4. Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provable Good Methods for DigitalWatermarking and Information Embedding. IEEE Trans. Info. Theory 47(4), 1423–1443 (2001)

    Article  MATH  Google Scholar 

  5. Comesaña, P., Pérez-Freire, L., Pérez-González, F.: The Return of the Sensitivity Attack. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 260–274. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing 6(12), 1673–1687 (1997)

    Article  Google Scholar 

  7. Deguillaume, F., Csurka, G., O’Ruanaidh, J., Pun, T.: Robust 3D DFT Digital Video Watermarking. In: Proceedings SPIE, vol. 3657, pp. 113–124 (1999)

    Google Scholar 

  8. Delaigle, J.F., De Vleeschouwer, C., Macq, B.: Watermarking algorithm based on a human visual model. Signal Processing 66, 319–335 (1998)

    Article  MATH  Google Scholar 

  9. Dong, P., Brankov, J.G., Galatsanos, N.P., Yang, Y., Davoine, F.: Digital Watermarks Robust to Geometric Distortions. IEEE Trans. Image Processing 14(12), 2140–2150 (2005)

    Article  Google Scholar 

  10. Doërr, G., Dugelay, J.: Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 216–230. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Doërr, G., Dugelay, J.: Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking. IEEE Trans. Signal Processing 52(10), 2955–2964 (2004)

    Article  Google Scholar 

  12. Doërr, G., Dugelay, J.: A Guide Tour of Video Watermarking. Signal Processing: Image Communication 18, 263–282 (2003)

    Google Scholar 

  13. Efron, B.: The Jackknife, the Bootstrap and other Resampling Plans. Society for Industrial and Applied Mathematics, Philadelphia (1982)

    Book  MATH  Google Scholar 

  14. Efron, B., Tibshirani, R.J.: An Introduction to the Bootstrap. Chapman & Hall, New York (1993)

    Book  MATH  Google Scholar 

  15. Ergun, F., Kilian, J., Kumar, R.: A Note on the Limits of Collusion-Resistant Watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 140–149. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  16. Furon, T.: A Survey of Watermarking Security. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 201–215. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  17. Khayam, S.A.: The Discrete Cosine Transform (DCT): Theory and Application. Michigan State University (2003)

    Google Scholar 

  18. Kuttera, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: Proc. of SPIE Security and Watermarking of Multimedia Contents, pp. 226–239 (1999)

    Google Scholar 

  19. Li, Y., Gao, X., Ji, H.: A 3D Wavelet based Spatial-temporal Approach for Video Watermarking. In: ICCIMA 2003. Fifth International Conference on Computational Intelligence and Multimedia Applications, pp. 260–265 (2003)

    Google Scholar 

  20. Podilchuk, C.I., Delp, E.J.: Digital Watermarking: Algorithms and Applications. Signal Processing Magazine 18(4), 33–46 (2001)

    Article  Google Scholar 

  21. Shao, J., Tu, D.: The Jackknife and Bootstrap. Springer, New York (2005)

    MATH  Google Scholar 

  22. Simpson, W.: Video Over IP. Focal Press (2005)

    Google Scholar 

  23. Soriano, M., Fernandez, M., Cotrina, J.: Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 231–243. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  24. Su, K., Kundur, D., Hatzinakos, D.: A Novel Approach to Collusion-resistant Video Watermarking. In: Proceedings SPIE, vol. 4675, pp. 491–502 (2002)

    Google Scholar 

  25. Su, K., Kundur, D., Hatzinakos, D.: A Content-Dependent Spatially Localized Video Watermark for Resistance to Collusion and Interpolation Attacks. In: Proceedings. 2001 International Conference on Image Processing, vol. 1, pp. 818–821 (2001)

    Google Scholar 

  26. Vila-Forcén, J.E., Voloshynovskiy, S., Koval, O., Pérez-González, F., Pun, T.: Practical Data-Hiding: Additive Attacks Performance Analysis. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 244–259. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  27. Vinod, P., Bora, P.K.: A New Inter-Frame Collusion Attack and a Countermeasure. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 147–157. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  28. Vinod, P., Bora, P.K.: Motion-compensated Inter-Frame collusion attack on video watermarking and a countermeasure. IEEE Proceedings on Information Security 153(2), 61–73

    Google Scholar 

  29. Wang, J., Gao, X., Shong, J.: A Video Watermarking based on 3-D Complex Wavelet. In: ICIP 2007, IEEE International Conference on Image Processing, vol. 5, pp. 493–496 (2007)

    Google Scholar 

  30. Wolfgang, R.B., Podilchuk, C.I., Delp, E.J.: Perceptual Watermarks for Digital Images and Video. Proceedings of IEEE 87(7), 1108–1126 (1999)

    Article  Google Scholar 

  31. Zhu, W., Xiong, Z., Zhang, Y.: Multiresolution Watermarking for Images and Video. IEEE Transactions on Circuits and Systems for Video Technology 9(4), 545–550 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Behseta, S., Lam, C., Sutton, J.E., Webb, R.L. (2009). A Time Series Intra-Video Collusion Attack on Frame-by-Frame Video Watermarking. In: Kim, HJ., Katzenbeisser, S., Ho, A.T.S. (eds) Digital Watermarking. IWDW 2008. Lecture Notes in Computer Science, vol 5450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04438-0_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04438-0_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04437-3

  • Online ISBN: 978-3-642-04438-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics