Attacking digital watermarks

نویسندگان

  • Radu Sion
  • Mikhail J. Atallah
چکیده

This paper discusses inherent vulnerabilities of digital watermarking that affect its mainstream purpose of rights protection. We ask: how resistant is watermarking to un-informed attacks ? There are a multitude of application scenarios for watermarking and, with the advent of modern content distribution networks and the associated rights assessment issues, it has recently become a topic of increasing interest. But how well is watermarking suited for this main purpose of rights protection ? Existing watermarking techniques are vulnerable to attacks threatening their overall viability. Most of these attacks have the final goal of removing the watermarking information while preserving the actual value of the watermarked Work. In this paper we identify an inherent trade-off between two important properties of watermarking algorithms: being “convincing enough” in court while at the same time surviving a set of attacks, for a broad class of watermarking algorithms. We show that there exist inherent limitations in protecting rights over digital Works. In the attempt to become as convincing as possible (e.g. in a court of law, low rate of false positives), watermarking applications become more fragile to attacks aimed at removing the watermark while preserving the value of the Work. They are thus necessarily characterized by a significant (e.g. in some cases 35%+) non-zero probability of being successfully attacked without any knowledge about their algorithmic details. We quantify this vulnerability for a class of algorithms and show how a minimizing “sweet spot” can be found. We then derive a set of recommendations for watermarking algorithm design.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Return of the Sensitivity Attack

The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum attacking distortion. This paper is intended as a tutorial on this problem, presenting an overview of previous research and introducing a new method based on a general formulation. This new method does not require any...

متن کامل

The Watermark Copy Attack

Research in digital watermarking has progressed along two paths. While new watermarking technologies are being developed, some researchers are also investigating di erent ways of attacking digital watermarks. Common attacks to watermarks usually aim to destroy the embedded watermark or to impair its detection. In this paper we propose a conceptually new attack for digitally watermarked images. ...

متن کامل

Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy

Multimedia digital data is highly redundant: successive video frames are very similar in a movie clip, most songs contain some repetitive patterns, etc. This property can consequently be exploited to successively replace each part of the signal with a similar one taken from another location in the same signal or with a combination of similar parts. Such an approach is all the more pertinent whe...

متن کامل

Digital Image Watermarking: Issues in Resolving Rightful Ownership - Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on

In recent literature many strategies for attacking and subverting a watermark have been presented. Such attacks suggest t ha t the ability t o embed non-erasable watermarks does not necessarily imply tha t the watermarking scheme can be used t o establish ownership. The main aim of this paper is t o formulate necessary and sufzcient requirements for a watermarking scheme t o be able t o resolve...

متن کامل

Digital Image Watermarking: Issues in Resolving Rightful Ownership

In recent literature many strategies for attacking and subverting a watermark have been presented. Such attacks suggest that the ability to embed non-erasable watermarks does not necessarily imply that the watermarking scheme can be used to establish ownership. The main aim of this paper is to formulate necessary and su cient requirements for a watermarking scheme to be able to resolve rightful...

متن کامل

A Digital Image Processing and Database System for Watermarks in Medieval Manuscripts

Watermarks are the most important tool for dating old, not explicitly dated paper documents. Hence, catalogues and databases of watermarks play an eminent role for the work of medievalist and paper historians. This article presents an integrated software system developed for storage, retrieval, manipulation, digital processing, and identification of watermarks in old manuscripts. The whole proc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004