Attack Model of Text Watermarking Based on Communications

As a valid means to discourage illicit distribution of information content, digital watermarking is a form of communication in essence. Inspired by the thoughts of watermarking communication model, an attack model of text watermarking based on communications is proposed in this paper. According to this attack model, in which the attackers’ abilities are considered, the known attacks under the three given conditions are analyzed. The research on these issues will promote the improvement on watermarking algorithms and fuel the development of text watermarking.

[1]  Radu Sion,et al.  Natural Language Watermarking and Tamperproofing , 2002, Information Hiding.

[2]  Gregory W. Wornell,et al.  The duality between information embedding and source coding with side information and some applications , 2003, IEEE Trans. Inf. Theory.

[3]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[4]  Steven H. Low,et al.  Marking text documents , 1997, Proceedings of International Conference on Image Processing.

[5]  Steven H. Low,et al.  Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.

[6]  Ingemar J. Cox,et al.  Digital Watermarking and Steganography , 2014 .

[7]  Chun-Shien Lu,et al.  Towards robust image watermarking: combining content-dependent key, moment normalization, and side-informed embedding , 2005, Signal Process. Image Commun..

[8]  Aaron D. Wyner,et al.  Channels with Side Information at the Transmitter , 1993 .

[9]  Ingemar J. Cox,et al.  The First 50 Years of Electronic Watermarking , 2002, EURASIP J. Adv. Signal Process..

[10]  S.H. Low,et al.  Capacity of text marking channel , 2000, IEEE Signal Processing Letters.

[11]  Thierry Pun,et al.  Attack modelling: towards a second generation watermarking benchmark , 2001, Signal Process..

[12]  Neri Merhav,et al.  Identification in the presence of side information with application to watermarking , 2001, IEEE Trans. Inf. Theory.

[13]  S. Pereira,et al.  Attacks on digital watermarks: classification, estimation based attacks, and benchmarks , 2001, IEEE Communications Magazine.

[14]  J. van Leeuwen,et al.  Information Hiding , 1999, Lecture Notes in Computer Science.

[15]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[16]  G.W. Wornell,et al.  An information-theoretic approach to the design of robust digital watermarking systems , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).