Spread spectrum watermarking: malicious attacks and counterattacks

نویسندگان

  • Frank Hartung
  • Jonathan K. Su
  • Bernd Girod
چکیده

Most watermarking methods for images and video have been proposed are based on ideas from spread spectrum radio communications, namely additive embedding of a (signal adaptive or non-adaptive) pseudo-noise watermark pattern, and watermark recovery by correlation. Even methods that are not presented as spread spectrum methods often build on these principles. Recently, some scepticism about the robustness of spread spectrum watermarks has arisen, speci cally with the general availability of watermark attack software which claim to render most watermarks undetectable. In fact, spread spectrum watermarks and watermark detectors in their simplest form are vulnerable to a variety of attacks. However, with appropriate modi cations to the embedding and extraction methods, spread spectrum methods can be made much more resistant against such attacks. In this paper, we systematically review proposed attacks on spread spectrum watermarks. Further, modi cations for watermark embedding and extraction are presented to avoid and counterattack these attacks. Important ingredients are, for example, to adapt the power spectrum of the watermark to the host signal power spectrum, and to employ an intelligent watermark detector with a block-wise multi-dimensional sliding correlator, which can recover the watermark even in the presence of geometric attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling

This paper investigates the multiplicative spread spectrum watermarking method for the image. The information bit is spreaded into middle-frequency Discrete Cosine Transform (DCT) coefficients of each block of an image using a generated pseudo-random sequence. Unlike the conventional signal modeling, we suppose that both signal and noise are distributed with Laplacian distribution, because the ...

متن کامل

Improved Watermarking Scheme Using Decimal Sequences

If the signal y has been marked and no malicious attacks or other signal modifications are performed, then E [y ⋅ w] = δ, else E [y ⋅ w] = 0. The threshold for detection is τ. The watermark is present if C (y, w) > τ. Under the conditions that x and w are i.i.d. signals, such a detection scheme is optimal. It is believed that spread spectrum (SS) method of watermarking can incorporate a high de...

متن کامل

An asymmetric watermarking method

This article presents an asymmetric watermarking method as an alternative to classical Direct Sequence Spread Spectrum and Watermarking Costa Schemes techniques. This new method provides a higher security level against malicious attacks threatening watermarking techniques used for a copy protection purpose. This application, which is quite different from the classical copyright enforcement issu...

متن کامل

Fully Robust Spread Spectrum Wavelet Watermarking System

Existing spread spectrum based watermarking techniques can not despread the encoded signal as expected in a typical spread spectrum communication system. Also the change in the statistics of the watermarked image as a result of attacks are not adequately compensated. It is therefore expected that these systems have not yielded the desired fully robust characteristics. This paper presents a spre...

متن کامل

Robust multiplicative video watermarking using statistical modeling

The present paper is intended to present a robust multiplicative video watermarking scheme. In this regard, the video signal is segmented into 3-D blocks like cubes, and then, the 3-D wavelet transform is applied to each block. The low frequency components of the wavelet coefficients are then used for data embedding to make the process robust against both malicious and unintentional attacks. Th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999