Blind pattern matching attack on watermarking systems

被引:44
作者
Kirovski, D [1 ]
Petitcolas, FAP
机构
[1] Microsoft Res, Redmond, WA 98052 USA
[2] Microsoft Res, Cambridge CB3 0FB, England
关键词
blind pattern matching; quantization index modulation; spread-spectrum watermarking; watermarking attacks;
D O I
10.1109/TSP.2003.809383
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Billions of dollars allegedly lost to piracy of multimedia content have recently triggered the industry to rethink the way music and films are distributed on the Internet. As encryption is vulnerable to digital or analog re-recording, currently almost all copyright protection mechanisms. rely to a certain extent on watermarking. A watermark is an,imperceptive secret hidden into a host signal. In this paper, we analyze the security of multimedia copyright protection systems that use watermarks by, proposing a new breed of attacks on generic watermarking systems. A typical blind pattern matching attack relies on the observation that multi media content is often highly repetitive. Thus, the attack procedure identifies subsets of signal blocks that are similar and permutes these blocks. Assuming the permuted blocks are marked with distinct secrets, it can be shown that any watermark detector is facing a task of exponential complexity to reverse the permutations as a preprocessing step for watermark detection. In this paper, we describe the logistics of the attack and an implementation against a spread-spectrum and a quantization index modulation data hiding technology for audio signals.
引用
收藏
页码:1045 / 1053
页数:9
相关论文
共 17 条
[1]  
ANDERSON RJ, 1996, LECT NOTES COMPUTER
[2]  
AUCSMITH D, 1998, LECT NOTES COMPUTER
[3]   Collusion-secure fingerprinting for digital data [J].
Boneh, D ;
Shaw, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) :1897-1905
[4]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[5]   INTERSECTING CODES AND INDEPENDENT FAMILIES [J].
COHEN, GD ;
ZEMOR, G .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (06) :1872-1881
[6]  
Cox I., 1996, LECT NOTES COMPUTER, P183
[7]  
KIROVSKI D, 2001, MSRTR200157
[8]  
KIROVSKI D, 2001, LECT NOTES COMPUTER, P354
[9]   The watermark copy attack [J].
Kutter, M ;
Voloshynovskiy, S ;
Herrigel, A .
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS II, 2000, 3971 :371-380
[10]  
LANGELAAR GC, 1998, P EUSIPCO, P2281