Attacks on digital watermarks: classification, estimation based attacks, and benchmarks
- 1 August 2001
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Communications Magazine
- Vol. 39 (8), 118-126
- https://doi.org/10.1109/35.940053
Abstract
Watermarking is a potential method for protection of ownership rights on digital audio, image, and video data. Benchmarks are used to evaluate the performance of different watermarking algorithms. For image watermarking, the Stirmark package is the most popular benchmark, and the best current algorithms perform well against it. However, results obtained by the Stirmark benchmark have to be handled carefully since Stirmark does not properly model the watermarking process and consequently is limited in its potential for impairing sophisticated image watermarking schemes. In this context, the goal of this article is threefold. First, we give an overview of the current attacking methods. Second, we describe attacks exploiting knowledge about the statistics of the original data and the embedded watermark. We propose a stochastic formulation of estimation-based attacks. Such attacks consist of two main stages: watermark estimation, exploitation of the estimated watermark to trick watermark detection or create ownership ambiguity. The full strength of estimation-based attacks can be achieved by introducing additional noise, where the attacker tries to combine the estimated watermark and the additive noise to impair watermark communication as much as possible while fulfilling a quality constraint on the attacked data. With a sophisticated quality constraint it is also possible to exploit human perception: the human auditory system in case of audio watermarks and the human visual system in case of image and video watermarks. Third, we discuss the current status of image watermarking benchmarks. We present Petitcolas'(see Electronic Imaging '99: Security and Watermarking of Multimedia Content, SPIE Proc., vol.3657, San Jose, CA, 1999) Stirmark benchmarking tool. Next, we consider the benchmark proposed by the University of Geneva Vision Group that contains more deliberate attacks. Finally, we summarize the current work of the European Certimark project, whose goal is to accelerate efforts from a number of research groups and companies in order to produce an improved ensemble of benchmarking tools.Keywords
This publication has 9 references indexed in Scilit:
- Power-spectrum condition for energy-efficient watermarkingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- On the invertibility of invisible watermarking techniquesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Information-theoretic analysis of information hidingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Attack modelling: towards a second generation watermarking benchmarkSignal Processing, 2001
- Analysis of digital watermarks subjected to optimum linear filtering and additive noiseSignal Processing, 2001
- Dither modulation: a new approach to digital watermarking and information embeddingPublished by SPIE-Intl Soc Optical Eng ,1999
- Fair benchmark for image watermarking systemsPublished by SPIE-Intl Soc Optical Eng ,1999
- Spread spectrum watermarking: malicious attacks and counterattacksPublished by SPIE-Intl Soc Optical Eng ,1999
- Secure spread spectrum watermarking for multimediaIEEE Transactions on Image Processing, 1997