Better security levels for broken arrows
نویسندگان
چکیده
This paper considers the security aspect of the robust zero-bit watermarking technique ‘Broken Arrows’(BA), which was invented and tested for the international challenge BOWS-2. The results of the first episode of the challenge showed that BA is very robust. Last year, we proposed an enhancement so-called AWC, which further strengthens the robustness against the worst attack disclosed during the challenge. However, in the second and third episodes of the challenge, when the pirate observes plenty of watermarked pictures with the same secret key, some security flaws have been discovered. They clearly prevent the use of BA in multimedia fingerprinting application, as suggested in. Our contributions focus on finding some counter-attacks. We carefully investigate BA and its variant AWC, and take two recently published security attacks as the potential threats. Based on this, we propose three countermeasures: benefiting from the improved embedding technique AWC; regulating the system parameters to lighten the watermarking embedding footprint; and extending the zero bit watermarking to multi-bits for further increase the security level. With this design, experimental results show that these security attacks do not work any more, and the security level is further increased.
منابع مشابه
Broken Arrows
This paper makes an account of the design and investigations done for the still image watermarking technique used in the 2nd edition of the BOWS challenge. This technique is named “broken arrows” for some reasons given later on, and abbreviated “BA.” This zero-bit algorithm is an implementation of a recent theoretical result by Merhav and Sabbag (2008) with precautions taken with respect to rob...
متن کاملExpectation maximization decoding of Tardos probabilistic fingerprinting code
This paper presents our recent works on multimedia fingerprinting, improving both the fingerprinting code and the watermarking scheme. Our first contribution focuses on deriving a better accusation process for the well known Tardos codes. It appears that Tardos orginal decoding is very conservative: its performances are guaranteed whatever the collusion strategy. Indeed, major improvements stem...
متن کاملA novel embedding technique for dirty paper trellis codes watermarking
→ Security weakness (Kerckhoffs's framework). Code book estimable on a simplified version [2]. → High computational complexity of the Embedding part Lin et al. [3] solution is not enough satisfying in term of robustness-distortion tradeoff. → DCT artifacts. [1] “Applying Informed Coding and Informed Embedding to Design a Robust, High Capacity Watermark”, Miller, Doërr, and Cox, IEEE TIP 2004. [...
متن کاملArrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful information-flow control mechanisms including dynamic security lattices, run-time code privileges and declassification all without modifying the base language. This design avoids the redundant work of producing new languages, l...
متن کاملProviding better confidentiality and authentication on the Internet using Namecoin and MinimaLT
In this paper, we introduce a duo of improvements for the Internet that would lead to better security. The authentication model on the Internet is broken and TLS connections have a considerable overhead. We try to address those issues with changes in both the application layer, discussing a replacement for the DNS system, and in the transport layer, a drop-in replacement for TCP built on top of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010