Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

Slides:



Advertisements
Similar presentations
H IGH CAPACITY WATERMARKING H YPERSPECTRAL I MAGES AUTHENTICATION Mehdi Fallahpour Jordi Serra-Ruiz David Megías.
Advertisements

Spatial Filtering (Chapter 3)
Digital Watermarking for Telltale Tamper Proofing and Authentication Deepa Kundur, Dimitrios Hatzinakos Presentation by Kin-chung Wong.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
N-Secure Fingerprinting for Copyright Protection of Multimedia
Desynchronization Attacks on Watermarks
Fifth International Conference on Information
Interword Distance Changes Represented by Sine Waves for Watermarking Text Images Author: Ding Huang Supervisor: Prof. Hong Yan.
Detecting Image Region Duplication Using SIFT Features March 16, ICASSP 2010 Dallas, TX Xunyu Pan and Siwei Lyu Computer Science Department University.
Bit-Plane Watermarking for SPIHT-Coded Images 台北科技大學資工所 指導教授:楊士萱 學生:廖武傑 2003/07/29.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Xinqiao LiuRate constrained conditional replenishment1 Rate-Constrained Conditional Replenishment with Adaptive Change Detection Xinqiao Liu December 8,
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
MULTIMEDIA: CRYPTO IS NOT ENOUGH 9/09/2015 | pag. 2.
Robust Mesh-based Hashing for Copy Detection and Tracing of Images Chun-Shien Lu, Chao-Yong Hsu, Shih-Wei Sun, and Pao-Chi Chang Proc. IEEE Int. Conf.
DIGITAL WATERMARKING Ngô Huy Phúc Trần Kim Lân Phạm Quốc Hiệp
Introduction to Visible Watermarking IPR Course: TA Lecture 2002/12/18 NTU CSIE R105.
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Zhejiang University Wavelet-based 3D mesh model watermarking Shi Jiao-Ying State Key Laboratory of CAD&CG, Zhejiang University, Hangzhou
Multiple Image Watermarking Applied to Health Information Management
1 Security and Robustness Enhancement for Image Data Hiding Authors: Ning Liu, Palak Amin, and K. P. Subbalakshmi, Senior Member, IEEE IEEE TRANSACTIONS.
Data Hiding in Image and Video Part I: Fundamental Issues and Solutions ECE 738 Class Presentation By Tanaphol Thaipanich
MPEG-4 AVC robust video watermarking based on QIM and perceptual masking principles Marwen HASNAOUI Maher BELHAJ Mihai MITREA Françoise PRETEUX ARTEMIS.
Basic Concepts of Audio Watermarking. Selection of Different Approaches Embedding Domain  time domain  frequency domain DFT, DCT, etc. Modulation Method.
Digital Watermarking
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
CHAPTER 5 SIGNAL SPACE ANALYSIS
Quantization Watermarking Design and Analysis of Digital Watermarking, Information Embedding, and Data Hiding Systems Brian Chen, Ph. D. Dissertation,
Event retrieval in large video collections with circulant temporal encoding CVPR 2013 Oral.
An Improved Method Of Content Based Image Watermarking Arvind Kumar Parthasarathy and Subhash Kak 黃阡廷 2008/12/3.
The Restricted Matched Filter for Distributed Detection Charles Sestok and Alan Oppenheim MIT DARPA SensIT PI Meeting Jan. 16, 2002.
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
Cluster validation Integration ICES Bioinformatics.
Data Hiding in Image and Video: Part II—Designs and Applications Min Wu, Heather Yu, and Bede Liu.
1 Watermarking Scheme Capable of Resisting Sensitivity Attack IEEE signal processing letters, vol. 14, no. 2, February. 2007, pp Xinpeng Zhang.
Multiple watermarking Wu Dan Introduction (I) Multipurpose watermarking Ownership watermarks (very robust) Captioning watermarks ( robust)
Constellation Diagram
Vector Quantization CAP5015 Fall 2005.
Program Homework Implementation of the Improved Spread Spectrum Watermarking System.
Blind Quality Assessment System for Multimedia Communications Using Tracing Watermarking P. Campisi, M. Carli, G. Giunta and A. Neri IEEE Transactions.
Multi resolution Watermarking For Digital Images Presented by: Mohammed Alnatheer Kareem Ammar Instructor: Dr. Donald Adjeroh CS591K Multimedia Systems.
Basic Message Coding 《 Digital Watermarking: Principles & Practice 》 Chapter 3 Multimedia Security.
Spread Spectrum and Image Adaptive Watermarking A Compare/Contrast summary of: “Secure Spread Spectrum Watermarking for Multimedia” [Cox ‘97] and “Image-Adaptive.
MMC LAB Secure Spread Spectrum Watermarking for Multimedia KAIST MMC LAB Seung jin Ryu 1MMC LAB.
Institute for Experimental Mathematics Ellernstrasse Essen - Germany DATA COMMUNICATION introduction A.J. Han Vinck May 10, 2003.
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
An improved SVD-based watermarking scheme using human visual characteristics Chih-Chin Lai Department of Electrical Engineering, National University of.
Watermarking Scheme Capable of Resisting Sensitivity Attack
Introduction to Audio Watermarking Schemes N. Lazic and P
Random Testing: Theoretical Results and Practical Implications IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2012 Andrea Arcuri, Member, IEEE, Muhammad.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Reference Ingemar J. Cox, Joe Kilian, F. Thomson Leighton, and Talal Shamoon, "Secure Spread Spectrum Watermarking for Multimedia," IEEE Trans. on Image.
Traffic Sign Recognition Using Discriminative Local Features Andrzej Ruta, Yongmin Li, Xiaohui Liu School of Information Systems, Computing and Mathematics.
DONE BY S.MURALIRAJAN M.NIRMAL
Robustness Evaluation of Perceptual Watermarks
Watermarking with Side Information
Basic Concepts of Audio Watermarking
Signal-Coherent Watermarking Schemes
Exposing Digital Forgeries by Detecting Traces of Resampling Alin C
Parag Agarwal Digital Watermarking Parag Agarwal
Spread Spectrum Watermarking
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Improved Spread Spectrum: A New Modulation Technique for Robust Watermarking IEEE Trans. On Signal Processing, April 2003 Multimedia Security.
Digital Watermarking for Image Authentication with Localization
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Watermarking with Side Information
An image adaptive, wavelet-based watermarking of digital images
Presentation transcript:

Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003

Outline Introduction The blind pattern matching attack (BPM) –Notations –Attacking steps –Attacking parameter determination BPM attacks for spread-spectrum watermarking and quantization watermarking of audio signals Conclusions

To Attack Digital Watermarking Main types of attacks –To remove the watermark Estimating the unmarked cover signal –Median filters Collusion attacks for fingerprinting –To prevent the detector from detecting the watermark Geometric distortions

The BPM Attack An attack aims to reduce the correlation of a watermarked signal with its watermark by replacing blocks of samples of the marked signal with perceptually similar blocks that are either not marked or marked with a different watermark

Attacking Strategy 1.Partition the content into overlapping low-granularity signal blocks 2.Identify subsets of perceptually similar blocks 3.Randomly permute their locations in the signal

Search Space If the number of blocks that have perceptually similar counterparts within the media clip is small, the adversary can seek replacement blocks in an external multimedia library Even without external replacement, watermark detector faces a task of exponential complexity to reverse the permutation

Block Sizes The adversary needs to reduce the granularity of integral blocks of data such that no block contains enough information from which a watermark can be identified individually –Blocks considered for BPM must at least one order of magnitude smaller than watermark length Audio: coefficients Video: 64x64 pixels

Notations Host signal Watermark Marked signal The BPM attack is not limited to certain signal model. The Gaussian assumption facilitates further analysis. e.g. in spread-spectrum watermarking,

Attacking Concerns Signal partitioning Similarity function –Determining the lower bound of similarity Pattern matching Block substitution

Signal Partitioning The watermarked signal is partitioned into n overlapping blocks. Each block B p represents a sequence of m samples starting at Why overlapping? –Consecutive blocks may lack perceptually similar characteristics :the overlap ratio

Similarity Function The quadratic Euclidean distance between blocks are used:

Pattern Matching Perceptual similarities between individual blocks are identified by a symmetric similarity bit-matrix S: The upper bound preserves fidelity, the lower bound is required since a block of exceptional similarity will not affect watermark detection if otherwise :parameters that denote the minimal and maximal average similarity

Determining the Lower Bound (1/2) In the SS watermark detector –The watermark w is detected in the signal z by matched filtering If z has been marked with w Otherwise Detection threshold

Determining the Lower Bound (2/2) Now assume the vector x+w is similar to and replaced by y+v if

Block Substitution 1.Copy 2.Marked all blocks as unvisited 3.Find unvisited Block B p 4.Let G p be a set of indices, s.t. 5.Let L p be a random permutation of elements of G p 6.Reorder blocks of with G p according to L p 7.Marks all blocks in G p as visited 8.Go to Step 3.

Experimental Results Test BPM attacks for audio contents watermarked with spread-spectrum and quantization index modulation schemes –For the SS scheme, within a 30s audio clip, the attack creates approximate 4 to 5 dB noise and brings the SS correlation detector to half the expected value without attack –Similar adversary effects can be obtained for the QIM detector

Remedies against the BPM Attack Identifying rare parts of the content and marked these parts only –Reducing the practical capacity and increasing the embedding complexity Longer watermarks and increased detector sensitivity –Very-long watermark sequence and lower robustness against other attacks