Exploiting self-similarities to defeat digital watermarking systems: a case study on still images

Unauthorized digital copying is a major concern for multi-media content providers. Since copyright owners lose control over content distribution as soon as data is decrypted or unscrambled, digital watermarking has been introduced as a complementary protection technology. In an effort to anticipate hostile behaviors of adversaries, the research community is constantly introducing novel attacks to benchmark watermarking systems. In this paper, a generic block replacement attack will be presented. The underlying assumption is that multimedia content is highly repetitive. It should consequently be possible to exploit the self-similarities of the signal to replace each signal block with another perceptually similar one. Alternative methods to compute such a valid placement block will be surveyed in this paper. Then,experimental results on still images will be presented to the efficiency of the presented attack in comparison with other reference image processing operations. Finally, a will be conducted to exhibit the properties that a watermark should have to resist to this attack.

[1]  Y. Fisher Fractal image compression: theory and application , 1995 .

[2]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[3]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.

[4]  M. Kutter Watermaking resisting to translation, rotation, and scaling , 1998 .

[5]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..

[6]  Darko Kirovski,et al.  The blind pattern matching attack on watermark systems , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[7]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.

[8]  Ingemar J. Cox,et al.  Preprocessing media to facilitate later insertion of a watermark , 2002, 2002 14th International Conference on Digital Signal Processing Proceedings. DSP 2002 (Cat. No.02TH8628).

[9]  Darko Kirovski,et al.  Blind pattern matching attack on watermarking systems , 2003, IEEE Trans. Signal Process..

[10]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[11]  Thierry Pun,et al.  Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.

[12]  Thierry Pun,et al.  Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..

[13]  Bernd Girod,et al.  Power-spectrum condition for energy-efficient watermarking , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[14]  Darko Kirovski,et al.  Replacement Attack on Arbitrary Watermarking Systems , 2002, Digital Rights Management Workshop.

[15]  Jean-Luc Dugelay,et al.  Secure background watermarking based on video mosaicing , 2004, IS&T/SPIE Electronic Imaging.

[16]  Gabriela Csurka,et al.  Toward generic image dewatermarking? , 2002, Proceedings. International Conference on Image Processing.

[17]  Min Wu,et al.  Attacks on digital watermarks , 1999, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020).

[18]  Christian Rey,et al.  Tatouage d'images : gain en robustesse et intégrité des images , 2003 .

[19]  Jean-Luc Dugelay,et al.  Security pitfalls of frame-by-frame approaches to video watermarking , 2004, IEEE Transactions on Signal Processing.

[20]  Thierry Pun,et al.  Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.

[21]  Jean-Luc Dugelay,et al.  New intra-video collusion attack using mosaicing , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[22]  Minerva M. Yeung,et al.  Robust frame-dependent video watermarking , 2000, Electronic Imaging.

[23]  Henri Cohen,et al.  A course in computational algebraic number theory , 1993, Graduate texts in mathematics.

[24]  Thomas S. Huang,et al.  A fractal-based image block-coding algorithm , 1993, 1993 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[25]  Arnaud E. Jacquin,et al.  A novel fractal block-coding technique for digital images , 1990, International Conference on Acoustics, Speech, and Signal Processing.

[26]  Martin Kutter,et al.  Watermarking resistance to translation, rotation, and scaling , 1999, Other Conferences.

[27]  Reginald L. Lagendijk,et al.  Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[28]  Lorrie Faith Cranor,et al.  Analysis of security vulnerabilities in the movie production and distribution process , 2003, DRM '03.

[29]  Martin F. H. Schuurmans,et al.  Digital watermarking , 2002, Proceedings of ASP-DAC/VLSI Design 2002. 7th Asia and South Pacific Design Automation Conference and 15h International Conference on VLSI Design.

[30]  Darko Kirovski,et al.  Robust Covert Communication over a Public Audio Channel Using Spread Spectrum , 2001, Information Hiding.

[31]  Sviatoslav Voloshynovskiy,et al.  Watermark template attack , 2001, IS&T/SPIE Electronic Imaging.

[32]  Tor A. Ramstad,et al.  An inner product space approach to image coding by contractive transformations , 1991, [Proceedings] ICASSP 91: 1991 International Conference on Acoustics, Speech, and Signal Processing.