Improving the security of watermark public detectors

In this paper, we analyze the watermark detection when the decoder is publicly available. This situation puts new challenges of current watermark design to assure the decoder security, The common feature among most watermarking algorithms is that the decision boundary can be completely specified by a finite set of parameters. Hence, it can be estimated using a finite number of samples. In this paper, we describe a generalized attack for removing the watermark with minor perceptual distortion and establish its effectiveness using a direct implementation with least mean square (LMS) algorithm. The attack is abstract and can be applied to image, audio, and video watermarking schemes. Next, we describe a counterattack by using fractal decision boundaries, which are obtained by processing the original boundary. The resulting boundary cannot be parameterized and hence it cannot be estimated using a finite number of samples. The performance of the new technique is essentially similar to any watermarking algorithm from which it is derived.

[1]  Athanasios Papoulis,et al.  Probability, Random Variables and Stochastic Processes , 1965 .

[2]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[3]  Irene A. Stegun,et al.  Handbook of Mathematical Functions. , 1966 .

[4]  Mohamed F. Mansour,et al.  Techniques for data embedding in image using wavelet extrema , 2001, IS&T/SPIE Electronic Imaging.

[5]  Jean-Paul M. G. Linnartz,et al.  Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[6]  S. Haykin,et al.  Adaptive Filter Theory , 1986 .

[7]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[8]  Steven Kay,et al.  Fundamentals Of Statistical Signal Processing , 2001 .

[9]  Gregory W. Wornell,et al.  Dither modulation: a new approach to digital watermarking and information embedding , 1999, Electronic Imaging.

[10]  G. C. Langelaar,et al.  Watermarking digital image and video data , 2000 .

[11]  Fernando Pérez-González,et al.  DCT-domain watermarking techniques for still images: detector performance analysis and a new structure , 2000, IEEE Trans. Image Process..

[12]  Jean-Paul M. G. Linnartz,et al.  Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.

[13]  Pierre Duhamel,et al.  Unified approach of asymmetric watermarking schemes , 2001, IS&T/SPIE Electronic Imaging.

[14]  William H. Press,et al.  Numerical recipes in C , 2002 .

[15]  Mohamed F. Mansour,et al.  Robust high capacity data embedding , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[16]  Benoit B. Mandelbrot,et al.  Fractal Geometry of Nature , 1984 .