An Estimation Attack on Content-Based Video Fingerprinting

In this paper we propose a simple signal processing procedure that aims at removing low-frequency fingerprints embedded in video signals. Although we construct an instance of the attack and show its efficacy using a specific video fingerprinting algorithm, the generic form of the attack can be applied to an arbitrary video marking scheme. The proposed attack uses two estimates: one of the embedded fingerprint and another of the original content, to create the attack vector. This vector is amplified and subtracted from the fingerprinted video sequence to create the attacked copy. The amplification factor is maximized under the constraint of achieving a desired level of visual fidelity. In the conducted experiments, the attack procedure on the average halved the expected detector correlation compared to additive white gaussian noise. It also substantially increased the probability of a false positive under attack for the addressed fingerprinting algorithm.

[1]  D. Kirovski,et al.  Fingerprinting and forensic analysis of multimedia , 2004, MULTIMEDIA '04.

[2]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[3]  Min Wu,et al.  Joint coding and embedding techniques for MultimediaFingerprinting , 2006, IEEE Transactions on Information Forensics and Security.

[4]  Oztan Harmanci,et al.  Motion picture watermarking via quantization of pseudo-random linear statistics , 2005, Visual Communications and Image Processing.

[5]  Darko Kirovski,et al.  Spread-spectrum watermarking of audio signals , 2003, IEEE Trans. Signal Process..

[6]  Bernd Girod,et al.  Power-spectrum condition for energy-efficient watermarking , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[7]  Chuan Yi Tang,et al.  A 2.|E|-Bit Distributed Algorithm for the Directed Euler Trail Problem , 1993, Inf. Process. Lett..

[8]  Joe Kilian,et al.  A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.

[9]  David Naccache,et al.  Topics in Cryptology — CT-RSA 2001 , 2001, Lecture Notes in Computer Science.

[10]  K. Mihcak Ramarathnam Venkatesan,et al.  Watermarking via optimization algorithms for quantizing ran- domized statistics of image regions , 2002 .

[11]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[12]  Richard Szeliski,et al.  High dynamic range video , 2003, ACM Trans. Graph..

[13]  Darko Kirovski,et al.  Collusion of fingerprints via the gradient attack , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[14]  Min Wu,et al.  Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..

[15]  Yacov Yacobi,et al.  Improved Boneh-Shaw Content Fingerprinting , 2001, CT-RSA.

[16]  Thierry Pun,et al.  Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.

[17]  Reginald L. Lagendijk,et al.  Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[18]  Jacques Stern,et al.  Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.

[19]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[20]  Ramarathnam Venkatesan,et al.  Robust video watermarking via optimization algorithm for quantization of pseudo-random semi-global statistics , 2005, IS&T/SPIE Electronic Imaging.

[21]  Mehmet Kivanç Mihçak,et al.  Complexity regularized video watermarking via quantization of pseudo-random semi-global linear statistics , 2005, 2005 13th European Signal Processing Conference.

[22]  Min Wu,et al.  Anti-collusion forensics of multimedia fingerprinting using orthogonal modulation , 2005, IEEE Transactions on Image Processing.