Skip to main content
Log in

An improved attack analysis on a public-key spread spectrum watermarking

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

We analyze the fingerprinting method in Kirovski et al. (2002) and suggest attacks that are better than the ones presented therein. To do this, we observe and use some extra information available in the system. We derive the optimal subtractive estimation attack structure in the sense of minimizing the expected value of the watermark detector statistics. Selection of different attack channel distortion constraints are also discussed. See Zhao et al. (2003) for various recently proposed attacks on spread spectrum fingerprinting systems for private watermarking.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Kirovski, D., Malvar, H.S., Yacobi, Y.: Multimedia content screening using a dual watermarking and fingerprinting System. In: ACM Multimedia (2002)

  2. Zhao, H., Wu, M., Wang, Z.J., Liu, K.J.R.: Nonlinear collusion attacks on independent fingerprints for multimedia. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP'03), Hong Kong, April (2003)

  3. Mıhçak, M.K., Venkatesan, R., Kesal, M.: Cryptanalysis of discrete-sequence spread spectrum watermarks. In: Proceedings of the 5th International Information Hiding Workshop (IH 2002), Noordwijkerhout, The Netherlands, October (2002)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mustafa Kesal.

Additional information

The material in this paper was presented in part at the ACM Conference, Magdeburg, Germany, September 2004.

This work was done while M. Kesal was with the Microsoft Research.

Categories and Subject Descriptors: G.3 [Probability and Statistics]: Probabilistic algorithms; H.1 [Information Systems]: Models and Principlesl H.1.1 [Systems and Information Theory]: General systems theory

General Terms: Security, Performance, Theory

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kesal, M., MihÇAk, M.K. & Venkatesan, R. An improved attack analysis on a public-key spread spectrum watermarking. Multimedia Systems 11, 133–142 (2005). https://doi.org/10.1007/s00530-005-0197-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-005-0197-0

Keywords

Navigation