Blind pattern matching attack on watermarking systems

Billions of dollars allegedly lost to piracy of multimedia content have triggered the industry to rethink the way music and films are distributed on the Internet. As encryption is vulnerable to digital or analog re-recording, currently almost all copyright protection mechanisms rely to a certain extent on watermarking. A watermark is an imperceptive secret hidden into a host signal. We analyze the security of multimedia copyright protection systems that use watermarks by proposing a new breed of attacks on generic watermarking systems. A typical blind pattern matching attack relies on the observation that multimedia content is often highly repetitive. Thus, the attack procedure identifies subsets of signal blocks that are similar and permutes these blocks. Assuming the permuted blocks are marked with distinct secrets, it can be shown that any watermark detector is facing a task of exponential complexity to reverse the permutations as a preprocessing step for watermark detection. We describe the logistics of the attack and an implementation against a spread-spectrum and a quantization index modulation data hiding technology for audio signals.

[1]  Darko Kirovski,et al.  Robust Covert Communication over a Public Audio Channel Using Spread Spectrum , 2001, Information Hiding.

[2]  Reginald L. Lagendijk,et al.  Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[3]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[4]  Thierry Pun,et al.  Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.

[5]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[6]  Edward J. Delp,et al.  Communications approach to image steganography , 2002, IS&T/SPIE Electronic Imaging.

[7]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[8]  Ross J. Anderson,et al.  Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[9]  Gérard D. Cohen,et al.  Intersecting codes and independent families , 1994, IEEE Trans. Inf. Theory.

[10]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[11]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[12]  D. Kirovski,et al.  A dual watermarking and fingerprinting system , 2002, Proceedings IEEE International Symposium on Information Theory,.

[13]  Henrique S. Malvar A modulated complex lapped transform and its applications to audio processing , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).