Combatting Ambiguity Attacks via Selective Detection of Embedded Watermarks

This paper focuses on a problem that is common to most watermarking-based ownership dispute resolutions and ownership assertion systems. Such systems are vulnerable to a simple but effective class of attacks that exploit the high false-positive rate of the watermarking techniques to cast doubt on the reliability of a resulting decision. To mitigate this vulnerability, we propose embedding multiple watermarks, as opposed to embedding a single watermark, and detecting a randomly selected subset of them while constraining the embedding distortion. The crux of the scheme lies in both watermark generation, which deploys a family of one-way functions and selective detection, which injects uncertainty into the detection process. The potential of this approach in reducing the false-positive probability is analyzed under various operating conditions and compared to single watermark embedding. The multiple watermark embedding and selective detection technique is incorporated analytically into the additive watermarking technique and results obtained through numerical solutions are presented to illustrate its effectiveness.

[1]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[2]  Stefan Katzenbeisser,et al.  On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving , 2003, IWDW.

[3]  Edward J. Delp,et al.  A WATERMARKING TECHNIQUE FOR DIGITAL IMAGERY: FURTHER STUDIES , 2001 .

[4]  Klara Nahrstedt,et al.  Watermarking methods for MPEG encoded video: towards resolving rightful ownership , 1998, Proceedings. IEEE International Conference on Multimedia Computing and Systems (Cat. No.98TB100241).

[5]  Stefan Katzenbeisser,et al.  Securing symmetric watermarking schemes against protocol attacks , 2002, IS&T/SPIE Electronic Imaging.

[6]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[7]  S. Pereira,et al.  Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.

[8]  Anastasios Tefas,et al.  A survey on watermarking application scenarios and related attacks , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).

[9]  Pierre Moulin,et al.  Data-Hiding Codes , 2005, Proceedings of the IEEE.

[10]  Ahmad-Reza Sadeghi,et al.  Proving Ownership of Digital Content , 1999, Information Hiding.

[11]  Wei Tsang Ooi,et al.  Hierarchical, non-uniform locality sensitive hashing and its application to video identification , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[12]  Ahmad-Reza Sadeghi,et al.  Advanced techniques for dispute resolving and authorship proofs on digital works , 2003, IS&T/SPIE Electronic Imaging.

[13]  Nasir D. Memon,et al.  Spatio–Temporal Transform Based Video Hashing , 2006, IEEE Transactions on Multimedia.

[14]  Vishal Monga,et al.  Robust Image Hashing Via Non-Negative Matrix Factorizations , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[15]  Stefan Katzenbeisser,et al.  Watermarking schemes provably secure against copy and ambiguity attacks , 2003, DRM '03.

[16]  N. Memon,et al.  Confusion/Diffusion Capabilities of Some Robust Hash Functions , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[17]  B. Liu,et al.  On resolving rightful ownerships of digital images by invisible watermarks , 1997, Proceedings of International Conference on Image Processing.

[18]  Ton Kalker,et al.  A robust image fingerprinting system using the Radon transform , 2004, Signal Process. Image Commun..

[19]  Ali N. Akansu,et al.  A robust protocol for proving ownership of multimedia content , 2004, IEEE Transactions on Multimedia.

[20]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..