Challenging the Security of CBIR Systems

Content-Based Image Retrieval Systems are now commonly used as a filtering mechanism against the piracy of multimedia contents. Many publications in the last few years have proposed very robust schemes where pirated contents are detected despite severe modifications. But none of these systems have addressed the piracy problem from a \emph{security} perspective. It is now time to check whether they are secure: Can pirates mount violent attacks against CBIRS by carefully studying the technology they use? This paper analyzes the security flaws of the typical technology blocks used in state-of-the-art CBIRS and shows it is possible to delude systems, making them useless in practice.

[1]  Edward Y. Chang,et al.  Clustering for Approximate Similarity Search in High-Dimensional Spaces , 2002, IEEE Trans. Knowl. Data Eng..

[2]  Fernando Pérez-González,et al.  Worst-case additive attack against quantization-based data-hiding methods , 2005, IS&T/SPIE Electronic Imaging.

[3]  G LoweDavid,et al.  Distinctive Image Features from Scale-Invariant Keypoints , 2004 .

[4]  Divyakant Agrawal,et al.  Approximate nearest neighbor searching in multimedia databases , 2001, Proceedings 17th International Conference on Data Engineering.

[5]  Hanan Samet,et al.  Foundations of multidimensional and metric data structures , 2006, Morgan Kaufmann series in data management systems.

[6]  Christopher Hunt,et al.  Notes on the OpenSURF Library , 2009 .

[7]  Ramarathnam Venkatesan,et al.  Robust perceptual image hashing via matrix invariants , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..

[8]  Li Chen,et al.  Video copy detection: a comparative study , 2007, CIVR '07.

[9]  Andrew Zisserman,et al.  Video Google: a text retrieval approach to object matching in videos , 2003, Proceedings Ninth IEEE International Conference on Computer Vision.

[10]  Fernando Pérez-González,et al.  The blind Newton sensitivity attack , 2006, Electronic Imaging.

[11]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[12]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[13]  Cordelia Schmid,et al.  A performance evaluation of local descriptors , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[14]  Trevor Darrell,et al.  Locality-Sensitive Hashing Using Stable Distributions , 2006 .

[15]  Olivier Buisson,et al.  Scalable mining of large video databases using copy detection , 2008, ACM Multimedia.

[16]  Laurent Amsaleg,et al.  Scalability of local image descriptors: a comparative study , 2006, MM '06.

[17]  Jiri Matas,et al.  Robust wide-baseline stereo from maximally stable extremal regions , 2004, Image Vis. Comput..

[18]  John W. Earl Tangential sensitivity analysis of watermarks using prior information , 2007, Electronic Imaging.

[19]  Min Wu,et al.  Unicity Distance of Robust Image Hashing , 2007, IEEE Transactions on Information Forensics and Security.

[20]  Pierre Moulin,et al.  On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks , 2006, Electronic Imaging.

[21]  Kannan Ramchandran,et al.  Dither-based secure image hashing using distributed coding , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).

[22]  Ramarathnam Venkatesan,et al.  The randlet transform: Applications to universal perceptual hash- ing and image identi¯cation , 2004 .