Watermark-Only Security Attack on DM-QIM Watermarking

作者: B. R. Matam , David Lowe

DOI: 10.4018/JDCF.2010040105

关键词: Computer scienceImage (mathematics)Theoretical computer scienceKey (cryptography)Digital watermarkingEmbeddingWatermarking attackDitherWatermarkFeature vectorSoftware

摘要: This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.

参考文章(19)
Ingemar J. Cox, Joe Kilian, Tom Leighton, Talal Shamoon, A Secure, Robust Watermark for Multimedia information hiding. pp. 185- 206 ,(1996) , 10.1007/3-540-61996-8_41
Christopher M. Bishop, Neural networks for pattern recognition ,(1995)
Wei Lee Woon, David Lowe, Nonlinear Signal Processing for Noise Reduction of Unaveraged Single Channel MEG Data Artificial Neural Networks — ICANN 2001. pp. 650- 657 ,(2001) , 10.1007/3-540-44668-0_91
Luis Pérez-Freire, Fernando Pérez-González, Exploiting security holes in lattice data hiding information hiding. ,vol. 4567, pp. 159- 173 ,(2007) , 10.1007/978-3-540-77370-2_11
T. Kalker, Considerations on watermarking security multimedia signal processing. pp. 201- 206 ,(2001) , 10.1109/MMSP.2001.962734
Matthew J. Holliman, Nasir D. Memon, Minerva M. Yeung, Watermark extimation through local pixel correlation electronic imaging. ,vol. 3657, pp. 134- 146 ,(1999) , 10.1117/12.344664
B.R. Matam, David Lowe, Exploiting sensitivity of nonorthogonal joint diagonalisation as a security mechanism in steganography international conference on digital signal processing. pp. 532- 538 ,(2009) , 10.1109/ICDSP.2009.5201074
B.R. Matam, David Lowe, Watermarking: How secure is the DM-QIM embedding technique? international conference on digital signal processing. pp. 401- 408 ,(2009) , 10.1109/ICDSP.2009.5201248