A Time Series Intra-Video Collusion Attack on Frame-by-Frame Video Watermarking

  • Sam Behseta
  • Charles Lam
  • Joseph E. Sutton
  • Robert L. Webb
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5450)


Current methods of digital watermarking for video rely on results from digital watermarking for images. However, watermarking each frame using image watermarking techniques is vulnerable to an intra-video collusion attack because it provides grounds to make statistical inference about information within consecutive frames. An algorithm using bootstrapped time series is proposed to exploit this vulnerability. Experimental results demonstrate that this algorithm produces a video with a significantly lower similarity to the given watermarked video using the standard watermark detector.


Discrete Cosine Transform Image Watermark Digital Watermark Watermark Method Host Signal 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Behseta, S., Lam, C., Webb, R.L.: A Bootstrap Attack on Digital Watermarks in the Frequency Domain. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 361–375. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  2. 2.
    Cannons, J., Moulin, P.: Design and Statistical Analysis of a Hash-Aided Image Watermarking System. IEEE Trans. Image Processing 13(10), 1393–1408 (2004)CrossRefGoogle Scholar
  3. 3.
    Chemak, C., Bouhlel, M.-S., Lapayre, J.-C.: New Watermarking Scheme for Security and Transmission of Medical Images for PocketNeuro Project. In: Spolecnost Pro Radioelektronicke Inzenyrstvi, pp. 58–63 (2007)Google Scholar
  4. 4.
    Chen, B., Wornell, G.W.: Quantization Index Modulation: A Class of Provable Good Methods for DigitalWatermarking and Information Embedding. IEEE Trans. Info. Theory 47(4), 1423–1443 (2001)CrossRefzbMATHGoogle Scholar
  5. 5.
    Comesaña, P., Pérez-Freire, L., Pérez-González, F.: The Return of the Sensitivity Attack. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 260–274. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  6. 6.
    Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing 6(12), 1673–1687 (1997)CrossRefGoogle Scholar
  7. 7.
    Deguillaume, F., Csurka, G., O’Ruanaidh, J., Pun, T.: Robust 3D DFT Digital Video Watermarking. In: Proceedings SPIE, vol. 3657, pp. 113–124 (1999)Google Scholar
  8. 8.
    Delaigle, J.F., De Vleeschouwer, C., Macq, B.: Watermarking algorithm based on a human visual model. Signal Processing 66, 319–335 (1998)CrossRefzbMATHGoogle Scholar
  9. 9.
    Dong, P., Brankov, J.G., Galatsanos, N.P., Yang, Y., Davoine, F.: Digital Watermarks Robust to Geometric Distortions. IEEE Trans. Image Processing 14(12), 2140–2150 (2005)CrossRefGoogle Scholar
  10. 10.
    Doërr, G., Dugelay, J.: Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 216–230. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  11. 11.
    Doërr, G., Dugelay, J.: Security Pitfalls of Frame-by-Frame Approaches to Video Watermarking. IEEE Trans. Signal Processing 52(10), 2955–2964 (2004)CrossRefGoogle Scholar
  12. 12.
    Doërr, G., Dugelay, J.: A Guide Tour of Video Watermarking. Signal Processing: Image Communication 18, 263–282 (2003)Google Scholar
  13. 13.
    Efron, B.: The Jackknife, the Bootstrap and other Resampling Plans. Society for Industrial and Applied Mathematics, Philadelphia (1982)CrossRefzbMATHGoogle Scholar
  14. 14.
    Efron, B., Tibshirani, R.J.: An Introduction to the Bootstrap. Chapman & Hall, New York (1993)CrossRefzbMATHGoogle Scholar
  15. 15.
    Ergun, F., Kilian, J., Kumar, R.: A Note on the Limits of Collusion-Resistant Watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 140–149. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  16. 16.
    Furon, T.: A Survey of Watermarking Security. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 201–215. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  17. 17.
    Khayam, S.A.: The Discrete Cosine Transform (DCT): Theory and Application. Michigan State University (2003)Google Scholar
  18. 18.
    Kuttera, M., Petitcolas, F.A.P.: A fair benchmark for image watermarking systems. In: Proc. of SPIE Security and Watermarking of Multimedia Contents, pp. 226–239 (1999)Google Scholar
  19. 19.
    Li, Y., Gao, X., Ji, H.: A 3D Wavelet based Spatial-temporal Approach for Video Watermarking. In: ICCIMA 2003. Fifth International Conference on Computational Intelligence and Multimedia Applications, pp. 260–265 (2003)Google Scholar
  20. 20.
    Podilchuk, C.I., Delp, E.J.: Digital Watermarking: Algorithms and Applications. Signal Processing Magazine 18(4), 33–46 (2001)CrossRefGoogle Scholar
  21. 21.
    Shao, J., Tu, D.: The Jackknife and Bootstrap. Springer, New York (2005)zbMATHGoogle Scholar
  22. 22.
    Simpson, W.: Video Over IP. Focal Press (2005)Google Scholar
  23. 23.
    Soriano, M., Fernandez, M., Cotrina, J.: Fingerprinting Schemes. Identifying the Guilty Sources Using Side Information. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 231–243. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  24. 24.
    Su, K., Kundur, D., Hatzinakos, D.: A Novel Approach to Collusion-resistant Video Watermarking. In: Proceedings SPIE, vol. 4675, pp. 491–502 (2002)Google Scholar
  25. 25.
    Su, K., Kundur, D., Hatzinakos, D.: A Content-Dependent Spatially Localized Video Watermark for Resistance to Collusion and Interpolation Attacks. In: Proceedings. 2001 International Conference on Image Processing, vol. 1, pp. 818–821 (2001)Google Scholar
  26. 26.
    Vila-Forcén, J.E., Voloshynovskiy, S., Koval, O., Pérez-González, F., Pun, T.: Practical Data-Hiding: Additive Attacks Performance Analysis. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 244–259. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  27. 27.
    Vinod, P., Bora, P.K.: A New Inter-Frame Collusion Attack and a Countermeasure. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 147–157. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  28. 28.
    Vinod, P., Bora, P.K.: Motion-compensated Inter-Frame collusion attack on video watermarking and a countermeasure. IEEE Proceedings on Information Security 153(2), 61–73Google Scholar
  29. 29.
    Wang, J., Gao, X., Shong, J.: A Video Watermarking based on 3-D Complex Wavelet. In: ICIP 2007, IEEE International Conference on Image Processing, vol. 5, pp. 493–496 (2007)Google Scholar
  30. 30.
    Wolfgang, R.B., Podilchuk, C.I., Delp, E.J.: Perceptual Watermarks for Digital Images and Video. Proceedings of IEEE 87(7), 1108–1126 (1999)CrossRefGoogle Scholar
  31. 31.
    Zhu, W., Xiong, Z., Zhang, Y.: Multiresolution Watermarking for Images and Video. IEEE Transactions on Circuits and Systems for Video Technology 9(4), 545–550 (1999)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Sam Behseta
    • 1
  • Charles Lam
    • 2
  • Joseph E. Sutton
    • 3
  • Robert L. Webb
    • 4
  1. 1.Department of MathematicsCalifornia State UniversityFullertonUSA
  2. 2.Department of MathematicsCalifornia State UniversityBakersfieldUSA
  3. 3.Department of Computer ScienceCalifornia State UniversityBakersfieldUSA
  4. 4.Department of Computer ScienceCalifornia Polytechnic State UniversitySan Luis ObispoUSA

Personalised recommendations