Paper
15 February 2006 Countermeasure for collusion attacks against digital watermarking
Martin Steinebach, Sascha Zmudzinski
Author Affiliations +
Proceedings Volume 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII; 60720D (2006) https://doi.org/10.1117/12.642189
Event: Electronic Imaging 2006, 2006, San Jose, California, United States
Abstract
Customer identification watermarking today is one of the most promising application domains of digital watermarking. It enables to identify individual copies of otherwise indistinguishable digital copies. If done without any precautions, those individual watermarking are vulnerable to a number of specialized attacks based on an attacker collecting more than one individual copy. Fingerprinting algorithms are used to create watermarks robust against these attacks, but the resulting watermarks require a high payload of the watermarking algorithm. As soon as a large number of copies need to be distinguished and more than two copies are available to the attacker, the watermarks are too long to be embedded with current algorithms. We present a novel alternative method to fight attacks aimed at individual customer identification watermarks. This is achieved by modifying the watermarked material in a way collusion attacks produce artifacts which significantly reduce the perceived quality while they do not affect the quality of the individual copies.
© (2006) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Martin Steinebach and Sascha Zmudzinski "Countermeasure for collusion attacks against digital watermarking", Proc. SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII, 60720D (15 February 2006); https://doi.org/10.1117/12.642189
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Phase shifting

Information security

Phase shifts

Algorithm development

Chemical elements

Data conversion

RELATED CONTENT

Next generation DRM: cryptography or forensics?
Proceedings of SPIE (February 04 2009)
A fast three-step phase shifting algorithm
Proceedings of SPIE (November 07 2005)
New seven-sample symmetrical phase-shifting algorithm
Proceedings of SPIE (February 05 1993)

Back to Top