How to Combat Block Replacement Attacks?

Block replacement attacks consist in exploiting the redundancy of the host signal to replace each signal block with another one or a combination of other ones. Such an attacking strategy has been recognized to be a major threat against watermarking systems e.g. additive spread-spectrum and quantization index modulation algorithms. In this paper, a novel embedding strategy will be introduced to circumvent this attack. The basic idea is to make the watermark inherit the self-similarities from the host signal. This can be achieved by imposing a linear structure on the watermark in a feature space e.g. the Gabor space. The relationship with existing multiplicative watermarking schemes will also be exhibited. Finally, experimental results will be presented and directions for future work will be discussed.

[1]  Mauro Barni,et al.  A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..

[2]  Jean-Luc Dugelay,et al.  Collusion issue in video watermarking , 2005, IS&T/SPIE Electronic Imaging.

[3]  Darko Kirovski,et al.  The blind pattern matching attack on watermark systems , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[4]  Bernd Girod,et al.  Informed Watermarking , 2002 .

[5]  Marian Stewart Bartlett,et al.  Classifying Facial Actions , 1999, IEEE Trans. Pattern Anal. Mach. Intell..

[6]  Thomas S. Huang,et al.  Robust optimum detection of transform domain multiplicative watermarks , 2003, IEEE Trans. Signal Process..

[7]  John Daugman Relaxation Neural Network For Complete Discrete 2-D Gabor Transforms , 1988, Other Conferences.

[8]  Y. Fisher Fractal image compression: theory and application , 1995 .

[9]  M. A. Repucci,et al.  Spatial Structure and Symmetry of Simple-Cell Receptive Fields in Macaque Primary Visual Cortex , 2002 .

[10]  William E. Higgins,et al.  Texture Segmentation using 2-D Gabor Elementary Functions , 1994, IEEE Trans. Pattern Anal. Mach. Intell..

[11]  Jean-Luc Dugelay,et al.  Security pitfalls of frame-by-frame approaches to video watermarking , 2004, IEEE Transactions on Signal Processing.

[12]  J. M. Foley,et al.  Contrast masking in human vision. , 1980, Journal of the Optical Society of America.

[13]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[14]  Darko Kirovski,et al.  Blind pattern matching attack on watermarking systems , 2003, IEEE Trans. Signal Process..

[15]  Stefan Fischer,et al.  Face authentication with Gabor information on deformable graphs , 1999, IEEE Trans. Image Process..

[16]  Teddy Furon,et al.  Watermarking security part one: Theory , 2005, IS&T/SPIE Electronic Imaging.

[17]  Deepa Kundur,et al.  Novel approach to collusion-resistant video watermarking , 2002, IS&T/SPIE Electronic Imaging.

[18]  Teddy Furon,et al.  Watermarking security part two: Practice , 2005, IS&T/SPIE Electronic Imaging.

[19]  Thierry Pun,et al.  A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.

[20]  Jean-Luc Dugelay,et al.  Exploiting self-similarities to defeat digital watermarking systems: a case study on still images , 2004, MM&Sec '04.

[21]  Jorge Herbert de Lira,et al.  Two-Dimensional Signal and Image Processing , 1989 .

[22]  Darko Kirovski,et al.  Replacement Attack on Arbitrary Watermarking Systems , 2002, Digital Rights Management Workshop.

[23]  Gabriela Csurka,et al.  Toward generic image dewatermarking? , 2002, Proceedings. International Conference on Image Processing.

[24]  Jean-Luc Dugelay,et al.  A Countermeasur to Resist Block Replacement Attacks , 2005, IEEE International Conference on Image Processing 2005.

[25]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.