Watermarking Scheme Capable of Resisting Sensitivity Attack

In sensitivity attacks, attempts across the boundary between "watermarked" and "not watermarked" using an available detector can provide adequate information about an embedded watermark for clearing it without causing serious distortion. This letter proposes a novel watermarking system capable of resisting such sensitivity attacks, which contains a tailor-made embedding algorithm and a corresponding detecting method. Although an attacker can still find the most effective way for destroying the watermark in a constructed signal near the boundary, it is impossible to move a watermarked product away from the "watermarked" region with low distortion. Therefore, the watermark detector can be widely distributed without fear of being used for sensitivity attacks

[1]  Fernando Pérez-González,et al.  The Return of the Sensitivity Attack , 2005, IWDW.

[2]  Ilaria Venturini Oracle Attacks and Covert Channels , 2005, IWDW.

[3]  Adrian S. Lewis,et al.  Image compression using the 2-D wavelet transform , 1992, IEEE Trans. Image Process..

[4]  Jean-Paul M. G. Linnartz,et al.  Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[5]  Mohamed F. Mansour,et al.  LMS-based attack on watermark public detectors , 2002, Proceedings. International Conference on Image Processing.

[6]  S. Pereira,et al.  Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.

[7]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[8]  Markus G. Kuhn,et al.  Information hiding-a survey , 1999, Proc. IEEE.

[9]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..