Spread spectrum watermarking: malicious attacks and counterattacks

Most watermarking methods for images and video have been proposed are based on ideas from spread spectrum radio communications, namely additive embedding of a (signal adaptive or non-adaptive) pseudo-noise watermark pattern, and watermark recovery by correlation. Even methods that are not presented as spread spectrum methods often build on these principles. Recently, some skepticism about the robustness of spread spectrum watermarks has arisen, specifically with the general availability of watermark attack software which claim to render most watermarks undetectable. In fact, spread spectrum watermarks and watermark detectors in their simplest form are vulnerable to a variety of attacks. However, with appropriate modifications to the embedding and extraction methods, spread spectrum methods can be made much more resistant against such attacks. In this paper, we review proposed attacks on spread spectrum watermarks are systematically. Further, modifications for watermark embedding and extraction are presented to avoid and counterattack these attacks. Important ingredients are, for example, to adapt the power spectrum of the watermark to the host signal power spectrum, and to employ an intelligent watermark detector with a block-wise multi-dimensional sliding correlator, which can recover the watermark even in the presence of geometric attacks.

[1]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..

[2]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[3]  Nasir D. Memon,et al.  On the invertibility of invisible watermarking techniques , 1997, Proceedings of International Conference on Image Processing.

[4]  M. Kutter Watermaking resisting to translation, rotation, and scaling , 1998 .

[5]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[6]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[7]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[8]  Ahmed H. Tewfik,et al.  Multimedia data-embedding and watermarking technologies , 1998, Proc. IEEE.

[9]  Bernd Girod,et al.  Channel model for a watermark attack , 1999, Electronic Imaging.

[10]  Edward J. Delp,et al.  A WATERMARKING TECHNIQUE FOR DIGITAL IMAGERY: FURTHER STUDIES , 2001 .

[11]  Walter Bender,et al.  Techniques for data hiding , 1995, Electronic Imaging.

[12]  Paul G. Flikkema,et al.  Spread-spectrum techniques for wireless communication , 1997, IEEE Signal Process. Mag..

[13]  David J. Fleet,et al.  Embedding invisible information in color images , 1997, Proceedings of International Conference on Image Processing.

[14]  Ton Kalker Watermark Estimation through Detector Observations , 1998 .

[15]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[16]  Thierry Pun,et al.  Rotation, scale and translation invariant digital image watermarking , 1997, Proceedings of International Conference on Image Processing.

[17]  Robert C. Dixon,et al.  Spread‐spectrum systems , 1976 .

[18]  Klara Nahrstedt,et al.  Watermarking Schemes and Protocols for Protecting Rightful Ownership and Customer's Rights , 1998, J. Vis. Commun. Image Represent..

[19]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[20]  Germano Caronni Assuring Ownership Rights for Digital Images , 1995, VIS.

[21]  Andrew Z. Tirkel,et al.  Image and watermark registration , 1998, Signal Process..

[22]  Lawrence O'Gorman,et al.  Protecting ownership rights through digital watermarking , 1996 .

[23]  Jean-Paul M. G. Linnartz,et al.  Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[24]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[25]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[26]  Reginald L. Lagendijk,et al.  Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[27]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[28]  D. Pearson,et al.  Attack operators for digitally watermarked images , 1998 .

[29]  Jean-Paul M. G. Linnartz,et al.  Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.

[30]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..

[31]  Minerva M. Yeung,et al.  An invisible watermarking technique for image verification , 1997, Proceedings of International Conference on Image Processing.