Skip to main content

The Return of the Sensitivity Attack

  • Conference paper
Digital Watermarking (IWDW 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3710))

Included in the following conference series:

Abstract

The sensitivity attack is considered as a serious threat to the security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum attacking distortion. This paper is intended as a tutorial on this problem, presenting an overview of previous research and introducing a new method based on a general formulation. This new method does not require any knowledge about the detection function nor any other system parameter, but just the binary output of the detector, being suitable for attacking most known watermarking methods. Finally, the soundness of this new approach is tested by attacking several of those methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kalker, T.: Considerations on watermarking security. In: IEEE International Workshop on Multimedia Signal Processing, MMSP 2001, Cannes, France, pp. 201–206 (2001)

    Google Scholar 

  2. Comesaña, P., Pérez–Freire, L., Pérez–González, F.: Fundamentals of data hiding security and their application to Spread–Spectrum analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 146–160. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  3. Cox, I.J., Linnartz, J.P.M.G.: Public watermarks and resistance to tampering. In: IEEE International Conference on Image Processing ICIP 1997, Santa Barbara, California, USA, vol. 3, pp. 3–6 (1997)

    Google Scholar 

  4. Cox, I.J., Killian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6, 1673–1687 (1997)

    Article  Google Scholar 

  5. Linnartz, J.P.M.G., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  6. Kalker, T., Linnartz, J.P., van Dijk, M.: Watermark estimation through detector analysis. In: IEEE International Conference on Image Processing, ICIP 1998, Chicago, IL, USA, pp. 425–429 (1998)

    Google Scholar 

  7. Mansour, M.F., Tewfik, A.H.: LMS–based attack on watermark public detectors. In: IEEE International Conference on Image Processing, ICIP 2002, vol. 3, pp. 649–652 (2002)

    Google Scholar 

  8. Furon, T., Venturini, I., Duhamel, P.: An unified approach of asymmetric watermarking schemes. In: Delp III, E.J., Wong, P.W. (eds.) and Watermarking of Multimedia Contents III, San Jose, California, USA, vol. 4314, pp. 269–279. SPIE (2001)

    Google Scholar 

  9. Furon, T., Macq, B., Hurley, N., Silvestre, G.: JANIS: Just Another N–order side–Informed watermarking Scheme. In: IEEE International Conference on Image Processing, ICIP 2002, Rochester, NY, USA, vol. 3, pp. 153–156 (2002)

    Google Scholar 

  10. El Choubassi, M., Moulin, P.: New sensitivity analysis attack. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography and Watermarking of Multimedia contents VII, pp. 734–745. SPIE (2005)

    Google Scholar 

  11. Furon, T., Duhamel, P.: An asymmetric watermarking method. IEEE Trans. on Signal Processing 51, 981–995 (2003); Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery

    Article  MathSciNet  Google Scholar 

  12. Nocedal, J., Wright, S.J.: Numerical Optimization. Springer, Heidelberg (1999)

    Book  MATH  Google Scholar 

  13. Cox, I.J., Miller, M.L., Bloom, J.A.: Digital watermarking. Multimedia Information and Systems. Morgan Kauffman, San Francisco (2002)

    Google Scholar 

  14. Eggers, J.J., Girod, B.: Blind watermarking applied to image authentication. In: Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), vol. 3, pp. 1977–1980 (2001)

    Google Scholar 

  15. Liu, T., Moulin, P.: Error exponents for one–bit watermarking. In: Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), vol. 3, pp. 65–68 (2003)

    Google Scholar 

  16. Pérez–Freire, L., Comesan̈a, P., Pérez–González, F.: Detection in quantizationbased watermarking: performance and security issues. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, California, USA, vol. 5681, pp. 721–733. SPIE (2005)

    Google Scholar 

  17. Hernández, J.R., Amado, M., Pérez–González, F.: DCT–domain watermarking techniques for still images: Detector performance analysis and a new structure. IEEE Trans. on Image Processing 9, 55–68 (2000); Special Issue on Image and Video Processing for Digital Libraries

    Article  Google Scholar 

  18. Adelsbach, A., Sadeghi, A.R.: Zero–knowledge watermark detection and proof of ownership. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 273–288. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Comesaña, P., Pérez-Freire, L., Pérez-González, F. (2005). The Return of the Sensitivity Attack. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_20

Download citation

  • DOI: https://doi.org/10.1007/11551492_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28768-1

  • Online ISBN: 978-3-540-32052-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics