Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes

Benchmarking watermarking systems now goes beyond only evaluating the ability of the embedded watermark to withstand common signal primitives such as filtering, resampling, lossy compression, D/A-A/D conversions, etc. Evaluation procedures have to consider how much information leaks from a watermarking system since such knowledge could prove most helpful to design very powerful attacks. This paper further refines an attack on dirty paper watermarking schemes which relies on security weaknesses i.e. information leakage. In particular, additional constraints are introduced to be able to handle 'complex' trellises. Moreover, the efficiency of this attack has been evaluated for different trellis configurations. Quite counter-intuitively, increasing the number of states in the trellis seems to enhance both the robustness and the security of the system.

[1]  Ingemar J. Cox,et al.  Trellis coded modulation to improve dirty paper trellis watermarking , 2007, Electronic Imaging.

[2]  A. Viterbi CDMA: Principles of Spread Spectrum Communication , 1995 .

[3]  Ingemar J. Cox,et al.  Toward a Better Understanding of Dirty Paper Trellis Codes , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[4]  Ingemar J. Cox,et al.  Applying informed coding and embedding to design a robust high-capacity watermark , 2004, IEEE Transactions on Image Processing.

[5]  Ton Kalker,et al.  Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[6]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[7]  Gwenaël J. Doërr,et al.  Practical Security Analysis of Dirty Paper Trellis Watermarking , 2007, Information Hiding.

[8]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[9]  J. MacQueen Some methods for classification and analysis of multivariate observations , 1967 .

[10]  Fernando Pérez-González,et al.  The blind Newton sensitivity attack , 2006, Electronic Imaging.

[11]  Ton Kalker,et al.  Title: a Security Risk for Publicly Available Watermark Detectors Author: Ton Kalker Conference: Benelux Information Theory Symposium a Security Risk for Publicly Available Watermark Detectors , 1998 .

[12]  Fernando Pérez-González,et al.  Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis , 2005, Information Hiding.

[13]  Teddy Furon,et al.  A Constructive and Unifying Framework for Zero-Bit Watermarking , 2006, IEEE Transactions on Information Forensics and Security.

[14]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.