skip to main content
10.1145/2600918.2600939acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacks

Published:11 June 2014Publication History

ABSTRACT

With unlimited access to a watermark detector, an attacker can use sensitivity attacks to remove the watermark of a digital medium. Randomized detectors and non-parametric decision boundaries are two ways of defending the watermark against these attacks. However, both approaches have their vulnerabilities when used individually. The first enables working with the randomized region boundary. The second still provides reliable information. This paper presents a combination of these two approaches to overcome their shortcomings. We develop a detector that has a randomized region with non-parametric outer boundaries. To empirically evaluate our combination, we apply two attack algorithms: Kalker's attack and Blind Newton Sensitivity Attack. The combination is more effective than the non-parametric boundary alone and comparable with using only the randomized threshold. In addition, we increase security by preventing attacks against the outer boundaries.

References

  1. M. Barni, P. Comesa~na-Alfaro, F. Pérez-Gonzalez, and B. Tondi. Are you threatening me?: Towards smart detectors in watermarking. In A. M. Alattar, N. D. Memon, and C. D. Heitzenrater, editors, Media Watermarking, Security, and Forensics 2014, volume 9028 of Proceedings of SPIE, pages 902806--902806. 2014.Google ScholarGoogle Scholar
  2. P. Bas, T. Filler, and T. Pevny. Break our steganographic system | the ins and outs of organizing BOSS. In T. Filler, T. Pevny, S. Craver, and A. Ker, editors, Information Hiding, volume 6958 of Lecture Notes in Computer Science, pages 59--70. Springer, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. P. Comesaña, L. Perez-Freire, and F. Pérez-González. Blind newton sensitivity attack. IEE Proceedings on Information Security, 153(3):115--125, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  4. I. J. Cox and J.-P. M. G. Linnartz. Public watermarks and resistance to tampering. In IEEE International Conference on Image Processing, pages 26--29, 1997.Google ScholarGoogle ScholarCross RefCross Ref
  5. I. J. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker. Digital watermarking and steganography. The Morgan Kaufmann Series in Multimedia Information and Systems. Morgan Kaufmann, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. El Choubassi and P. Moulin. On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks. In E. J. Delp III and P. W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072 of Proceedings of SPIE, pages 1--12. 2006.Google ScholarGoogle Scholar
  7. M. El Choubassi and P. Moulin. Sensitivity analysis attacks against randomized detectors. In IEEE International Conference on Image Processing, volume 2, pages 129--132, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  8. T. Furon and P. Bas. Broken arrows. EURASIP Journal on Information Security, 2008:1--13, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. T. Furon, B. Macq, N. Hurley, and G. Silvestre. JANIS: Just another N-order side-informed watermarking scheme. In IEEE International Conference on Image Processing, volume 3, pages 153--156, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  10. T. Furon, I. Venturini, and P. Duhamel. Unified approach of asymmetric watermarking schemes. In E. J. Delp III and P. W. Wong, editors, Security and Watermarking of Multimedia Contents III, volume 4314 of Proceedings of SPIE, pages 269--279. 2001.Google ScholarGoogle Scholar
  11. J. R. Hernandez, M. Amado, and F. Pérez-Gonalez. DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Transactions on Image Processing, 9(1):55--68, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. Kalker. Watermark estimation through detector observations. In IEEE Benelux Signal Processing Symposium, pages 119--122, 1998.Google ScholarGoogle Scholar
  13. J.-P. M. G. Linnartz and M. van Dijk. Analysis of the sensitivity attack against electronic watermarks in images. In D. Aucsmith, editor, Information Hiding, volume 1525 of Lecture Notes in Computer Science, pages 258--272. Springer, 1998.Google ScholarGoogle Scholar
  14. B. B. Mandelbrot. Die fraktale Geometrie der Natur. Birkhäuser Verlag, 1987.Google ScholarGoogle ScholarCross RefCross Ref
  15. M. F. Mansour and A. H. Tewfik. Improving the security of watermark public detectors. In 14th International Conference on Digital Signal Processing, volume 1, pages 59--66, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  16. R. Venkatesan and M. H. Jakubowski. Randomized detection for spread-spectrum watermarking: Defending against sensitivity and other attacks. In IEEE International Conference on Acoustics, Speech, and Signal Processing, volume 2, pages 9--12, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  17. I. Venturini. Oracle attacks and covert channels. In M. Barni, I. J. Cox, T. Kalker, and H.-J. Kim, editors, 4th International Workshop on Digital Watermarking, volume 3710 of Lecture Notes in Computer Science, pages 171--185. Springer, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      IH&MMSec '14: Proceedings of the 2nd ACM workshop on Information hiding and multimedia security
      June 2014
      212 pages
      ISBN:9781450326476
      DOI:10.1145/2600918

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 June 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      IH&MMSec '14 Paper Acceptance Rate24of64submissions,38%Overall Acceptance Rate128of318submissions,40%
    • Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader