On the Need for Signal-Coherent Watermarks

Digital watermarking has been introduced in the 1990s as a complementary technology for copyright protection. In an effort to anticipate hostile behavior of adversaries, the research community is constantly introducing new attacks to benchmark watermarking systems. In this paper, we present a generic attack strategy based on block replacement. As multimedia content is often highly repetitive, the attack exploits signal's self-similarities to replace each signal block with another, perceptually similar one. Guided by the principles of the proposed attack framework, we implemented three attack algorithms for different types of multimedia content: video shots, audio tracks and still images. Finally, considering the effectiveness of the proposed algorithms, we identify the properties that a watermark should have to counter this attacking strategy

[1]  Henri Nicolas,et al.  Motion and Illumination Variation Estimation Using a Hierarchy of Models: Application to Image Sequence Coding , 1995, J. Vis. Commun. Image Represent..

[2]  Jean-Luc Dugelay,et al.  Exploiting self-similarities to defeat digital watermarking systems: a case study on still images , 2004, MM&Sec '04.

[3]  Alan V. Oppenheim,et al.  Discrete-Time Signal Pro-cessing , 1989 .

[4]  Jean-Luc Dugelay,et al.  Security pitfalls of frame-by-frame approaches to video watermarking , 2004, IEEE Transactions on Signal Processing.

[5]  Phil Sallee,et al.  Model-Based Steganography , 2003, IWDW.

[6]  Darko Kirovski,et al.  Robust Covert Communication over a Public Audio Channel Using Spread Spectrum , 2001, Information Hiding.

[7]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[8]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[9]  Ton Kalker,et al.  Video watermarking system for broadcast monitoring , 1999, Electronic Imaging.

[10]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[11]  Reginald L. Lagendijk,et al.  Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[12]  Henrique S. Malvar A modulated complex lapped transform and its applications to audio processing , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[13]  J. R. Stuart,et al.  Coding High Quality Digital Audio , 1997 .

[14]  Minerva M. Yeung,et al.  Robust frame-dependent video watermarking , 2000, Electronic Imaging.

[15]  Y. Fisher Fractal image compression: theory and application , 1995 .

[16]  Bernd Girod,et al.  Power-spectrum condition for energy-efficient watermarking , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).

[17]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[18]  Darko Kirovski,et al.  Replacement Attack on Arbitrary Watermarking Systems , 2002, Digital Rights Management Workshop.

[19]  Jean-Luc Dugelay,et al.  Secure background watermarking based on video mosaicing , 2004, IS&T/SPIE Electronic Imaging.

[20]  Nasir D. Memon,et al.  Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes , 2000, IEEE Trans. Image Process..

[21]  Gabriela Csurka,et al.  Toward generic image dewatermarking? , 2002, Proceedings. International Conference on Image Processing.

[22]  Jean-Luc Dugelay,et al.  New intra-video collusion attack using mosaicing , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[23]  I. Jolliffe Principal Component Analysis , 2002 .

[24]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[25]  Thierry Pun,et al.  Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.