ABSTRACT
With unlimited access to a watermark detector, an attacker can use sensitivity attacks to remove the watermark of a digital medium. Randomized detectors and non-parametric decision boundaries are two ways of defending the watermark against these attacks. However, both approaches have their vulnerabilities when used individually. The first enables working with the randomized region boundary. The second still provides reliable information. This paper presents a combination of these two approaches to overcome their shortcomings. We develop a detector that has a randomized region with non-parametric outer boundaries. To empirically evaluate our combination, we apply two attack algorithms: Kalker's attack and Blind Newton Sensitivity Attack. The combination is more effective than the non-parametric boundary alone and comparable with using only the randomized threshold. In addition, we increase security by preventing attacks against the outer boundaries.
- M. Barni, P. Comesa~na-Alfaro, F. Pérez-Gonzalez, and B. Tondi. Are you threatening me?: Towards smart detectors in watermarking. In A. M. Alattar, N. D. Memon, and C. D. Heitzenrater, editors, Media Watermarking, Security, and Forensics 2014, volume 9028 of Proceedings of SPIE, pages 902806--902806. 2014.Google Scholar
- P. Bas, T. Filler, and T. Pevny. Break our steganographic system | the ins and outs of organizing BOSS. In T. Filler, T. Pevny, S. Craver, and A. Ker, editors, Information Hiding, volume 6958 of Lecture Notes in Computer Science, pages 59--70. Springer, 2011. Google ScholarDigital Library
- P. Comesaña, L. Perez-Freire, and F. Pérez-González. Blind newton sensitivity attack. IEE Proceedings on Information Security, 153(3):115--125, 2006.Google ScholarCross Ref
- I. J. Cox and J.-P. M. G. Linnartz. Public watermarks and resistance to tampering. In IEEE International Conference on Image Processing, pages 26--29, 1997.Google ScholarCross Ref
- I. J. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker. Digital watermarking and steganography. The Morgan Kaufmann Series in Multimedia Information and Systems. Morgan Kaufmann, 2002. Google ScholarDigital Library
- M. El Choubassi and P. Moulin. On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks. In E. J. Delp III and P. W. Wong, editors, Security, Steganography, and Watermarking of Multimedia Contents VIII, volume 6072 of Proceedings of SPIE, pages 1--12. 2006.Google Scholar
- M. El Choubassi and P. Moulin. Sensitivity analysis attacks against randomized detectors. In IEEE International Conference on Image Processing, volume 2, pages 129--132, 2007.Google ScholarCross Ref
- T. Furon and P. Bas. Broken arrows. EURASIP Journal on Information Security, 2008:1--13, 2008. Google ScholarDigital Library
- T. Furon, B. Macq, N. Hurley, and G. Silvestre. JANIS: Just another N-order side-informed watermarking scheme. In IEEE International Conference on Image Processing, volume 3, pages 153--156, 2002.Google ScholarCross Ref
- T. Furon, I. Venturini, and P. Duhamel. Unified approach of asymmetric watermarking schemes. In E. J. Delp III and P. W. Wong, editors, Security and Watermarking of Multimedia Contents III, volume 4314 of Proceedings of SPIE, pages 269--279. 2001.Google Scholar
- J. R. Hernandez, M. Amado, and F. Pérez-Gonalez. DCT-domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Transactions on Image Processing, 9(1):55--68, 2000. Google ScholarDigital Library
- T. Kalker. Watermark estimation through detector observations. In IEEE Benelux Signal Processing Symposium, pages 119--122, 1998.Google Scholar
- J.-P. M. G. Linnartz and M. van Dijk. Analysis of the sensitivity attack against electronic watermarks in images. In D. Aucsmith, editor, Information Hiding, volume 1525 of Lecture Notes in Computer Science, pages 258--272. Springer, 1998.Google Scholar
- B. B. Mandelbrot. Die fraktale Geometrie der Natur. Birkhäuser Verlag, 1987.Google ScholarCross Ref
- M. F. Mansour and A. H. Tewfik. Improving the security of watermark public detectors. In 14th International Conference on Digital Signal Processing, volume 1, pages 59--66, 2002.Google ScholarCross Ref
- R. Venkatesan and M. H. Jakubowski. Randomized detection for spread-spectrum watermarking: Defending against sensitivity and other attacks. In IEEE International Conference on Acoustics, Speech, and Signal Processing, volume 2, pages 9--12, 2005.Google ScholarCross Ref
- I. Venturini. Oracle attacks and covert channels. In M. Barni, I. J. Cox, T. Kalker, and H.-J. Kim, editors, 4th International Workshop on Digital Watermarking, volume 3710 of Lecture Notes in Computer Science, pages 171--185. Springer, 2005. Google ScholarDigital Library
Index Terms
- On the combination of randomized thresholds and non-parametric boundaries to protect digital watermarks against sensitivity attacks
Recommendations
On reliability and security of randomized detectors against sensitivity analysis attacks
Despite their popularity, spread spectrum schemes are vulnerable against sensitivity analysis attacks on standard deterministic watermark detectors. A possible defense is to use a randomized watermark detector. While randomization sacrifices some ...
Noniterative Algorithms for Sensitivity Analysis Attacks
Sensitivity analysis attacks constitute a powerful family of watermark "removal" attacks. They exploit vulnerability in some watermarking protocols: the attacker's unlimited access to the watermark detector. This paper proposes a mathematical framework ...
Malicious JavaScript Insertion through ARP Poisoning Attacks
Details about ARP poisoning attacks as well as countermeasures have been known for years. Yet, most networks are still vulnerable to these attacks because they haven't implemented defenses. This article explains how ARP poisoning attacks work and ...
Comments