A general framework for robust watermarking security

The analysis of the security of watermarking algorithms has received increasing attention since it has been recognized that the sole investigation of robustness issues is not enough to properly address the challenges set by practical applications. Such a security analysis, though, is still in its infancy, up to a point that a general agreement has not yet been reached even on the most fundamental problems. The purpose of this paper is to provide a general security framework encompassing most of the problems encountered in real-world applications. By considering the amount of information the attacker has about the watermarking algorithm, we introduce the notion of fair and un-fair attacks, so to ease the classification of different systems and attacks. Though we recognize that many important differences exist between watermarking and cryptographic security, a large part of our work is inspired by the Diffie-Helmann's paradigm, which is widely used in cryptography. For each class of systems great care is taken to describe both the attacker's and watermarker's point of view, presenting the challenges raised by each system to these different actors. Finally, we try to outline some research directions which, according to us, deserve further analysis.

[1]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..

[2]  Pierre Duhamel,et al.  An asymmetric watermarking method , 2003, IEEE Trans. Signal Process..

[3]  Matt L. Miller Is asymmetric watermarking necessary or sufficient? , 2002, 2002 11th European Signal Processing Conference.

[4]  Ingemar J. Cox,et al.  Copy protection for DVD video : Identification and protection of multimedia information , 1999 .

[5]  Fabien A. P. Petitcolas,et al.  Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..

[6]  Bernd Girod,et al.  Informed Watermarking , 2002 .

[7]  Simon Singh,et al.  The Code Book , 1999 .

[8]  Ingemar J. Cox,et al.  Copy protection for DVD video , 1999, Proc. IEEE.

[9]  Helga Seguin Introduction of Optical Broad-Band Networks in France , 1986, IEEE J. Sel. Areas Commun..

[10]  P. Laguna,et al.  Signal Processing , 2002, Yearbook of Medical Informatics.

[11]  Julien P. Stern,et al.  Automatic Detection of a Watermarked Document Using a Private Key , 2001, Information Hiding.

[12]  Julien P. Stern,et al.  Lessons learned from SDMI , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[13]  Thierry Pun,et al.  A Stochastic Approach to Content Adaptive Digital Image Watermarking , 1999, Information Hiding.

[14]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[15]  Ton Kalker,et al.  Title: a Security Risk for Publicly Available Watermark Detectors Author: Ton Kalker Conference: Benelux Information Theory Symposium a Security Risk for Publicly Available Watermark Detectors , 1998 .

[16]  Christine Guillemot,et al.  Perceptual watermarking of non i.i.d. signals based on wide spread spectrum using side information , 2002, Proceedings. International Conference on Image Processing.

[17]  Thierry Pun,et al.  Robust template matching for affine resistant image watermarks , 2000, IEEE Trans. Image Process..

[18]  Benoit M. Macq,et al.  JANIS: Just Another n-order Side-Informed Watermarking Scheme , 2002, Proceedings. International Conference on Image Processing.

[19]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[20]  Jörg Schwenk,et al.  Combining digital watermarks and collusion-secure fingerprints for digital images , 1999, Electronic Imaging.

[21]  Ton Kalker,et al.  Digital watermarking for DVD video copy protection , 2000 .

[22]  Reginald L. Lagendijk,et al.  Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[23]  Pierre Duhamel,et al.  Unified approach of asymmetric watermarking schemes , 2001, IS&T/SPIE Electronic Imaging.

[24]  Ton Kalker,et al.  Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[25]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..

[26]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[27]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[28]  Bernd Girod,et al.  Analysis of digital watermarks subjected to optimum linear filtering and additive noise , 2001, Signal Process..

[29]  Sviatoslav Voloshynovskiy,et al.  Watermark template attack , 2001, IS&T/SPIE Electronic Imaging.

[30]  Min Wu,et al.  Joint coding and embedding for collusion-resistant fingerprinting , 2002, 2002 11th European Signal Processing Conference.

[31]  Benoit M. Macq,et al.  A new video-object watermarking scheme robust to object manipulation , 2001, ICIP.

[32]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[33]  Thierry Pun,et al.  Fast Robust Template Matching for Affine Resistant Image Watermarks , 1999, Information Hiding.

[34]  Jessica J. Fridrich,et al.  Security of fragile authentication watermarks with localization , 2002, IS&T/SPIE Electronic Imaging.

[35]  Gabriela Csurka,et al.  Toward generic image dewatermarking? , 2002, Proceedings. International Conference on Image Processing.

[36]  Thierry Pun,et al.  Second Generation Benchmarking and Application Oriented Evaluation , 2001, Information Hiding.

[37]  Thomas Mittelholzer,et al.  An Information-Theoretic Approach to Steganography and Watermarking , 1999, Information Hiding.

[38]  Ton Kalker,et al.  Secret key watermarking with changing keys , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[39]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[40]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[41]  Darko Kirovski,et al.  Blind pattern matching attack on audio watermarking systems , 2002 .

[42]  Stefan Katzenbeisser,et al.  Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure , 2002, 2002 11th European Signal Processing Conference.

[43]  Mohamed F. Mansour,et al.  Secure detection of public watermarks with fractal decision boundaries , 2002, 2002 11th European Signal Processing Conference.

[44]  Anastasios Tefas,et al.  A benchmarking protocol for watermarking methods , 2001, Proceedings 2001 International Conference on Image Processing (Cat. No.01CH37205).