Danger of low-dimensional watermarking subspaces

The security issue has been neglected for a long time in digital watermarking. Recent results for video watermarking have pointed out that existing watermarking schemes are not secure, i.e., a hostile intelligence succeeds in removing the hidden watermarks. In particular, for a given secret key, many watermarking schemes embed watermarks which lie in the same low-dimensional subspace whatever the host data is. We show that this subspace can be quite easily estimated with an efficient principal component analysis (PCA). For storage convenience, an online expectation-maximization (EM) algorithm is considered. Once this watermarking subspace has been estimated, an attacker only has to project incoming data onto the orthogonal of this subspace to remove the watermark.

[1]  Shelby Pereira,et al.  Secure robust digital image watermark , 1998, Other Conferences.

[2]  Ingemar J. Cox,et al.  Applying informed coding and embedding to design a robust high-capacity watermark , 2004, IEEE Transactions on Image Processing.

[3]  Dan Collusion-Secure Fingerprinting for Digital Data , 2002 .

[4]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[5]  Sam T. Roweis,et al.  EM Algorithms for PCA and SPCA , 1997, NIPS.

[6]  Jean-Luc Dugelay,et al.  A guide tour of video watermarking , 2003, Signal Process. Image Commun..

[7]  Deepa Kundur,et al.  Novel approach to collusion-resistant video watermarking , 2002, IS&T/SPIE Electronic Imaging.

[8]  Damien Delannay,et al.  Method for hiding synchronization marks in scale- and rotation-resilient watermarking schemes , 2002, IS&T/SPIE Electronic Imaging.

[9]  Thierry Pun,et al.  Generalized watermarking attack based on watermark estimation and perceptual remodulation , 2000, Electronic Imaging.

[10]  Gregory W. Wornell,et al.  Dither modulation: a new approach to digital watermarking and information embedding , 1999, Electronic Imaging.

[11]  Ingemar J. Cox,et al.  Digital Watermarking , 2003, Lecture Notes in Computer Science.

[12]  Nasir D. Memon,et al.  A buyer-seller watermarking protocol , 1998, 1998 IEEE Second Workshop on Multimedia Signal Processing (Cat. No.98EX175).

[13]  Jean-Luc Dugelay,et al.  Secure Video Watermarking via Embedding Strength Modulation , 2003, IWDW.

[14]  Bernd Girod,et al.  Watermarking of uncompressed and compressed video , 1998, Signal Process..

[15]  Ton Kalker,et al.  Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).