Abstract
We analyze the fingerprinting method in Kirovski et al. (2002) and suggest attacks that are better than the ones presented therein. To do this, we observe and use some extra information available in the system. We derive the optimal subtractive estimation attack structure in the sense of minimizing the expected value of the watermark detector statistics. Selection of different attack channel distortion constraints are also discussed. See Zhao et al. (2003) for various recently proposed attacks on spread spectrum fingerprinting systems for private watermarking.
Similar content being viewed by others
References
Kirovski, D., Malvar, H.S., Yacobi, Y.: Multimedia content screening using a dual watermarking and fingerprinting System. In: ACM Multimedia (2002)
Zhao, H., Wu, M., Wang, Z.J., Liu, K.J.R.: Nonlinear collusion attacks on independent fingerprints for multimedia. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP'03), Hong Kong, April (2003)
Mıhçak, M.K., Venkatesan, R., Kesal, M.: Cryptanalysis of discrete-sequence spread spectrum watermarks. In: Proceedings of the 5th International Information Hiding Workshop (IH 2002), Noordwijkerhout, The Netherlands, October (2002)
Author information
Authors and Affiliations
Corresponding author
Additional information
The material in this paper was presented in part at the ACM Conference, Magdeburg, Germany, September 2004.
This work was done while M. Kesal was with the Microsoft Research.
Categories and Subject Descriptors: G.3 [Probability and Statistics]: Probabilistic algorithms; H.1 [Information Systems]: Models and Principlesl H.1.1 [Systems and Information Theory]: General systems theory
General Terms: Security, Performance, Theory
Rights and permissions
About this article
Cite this article
Kesal, M., MihÇAk, M.K. & Venkatesan, R. An improved attack analysis on a public-key spread spectrum watermarking. Multimedia Systems 11, 133–142 (2005). https://doi.org/10.1007/s00530-005-0197-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-005-0197-0