Skip to main content

Combined Fingerprinting Attacks Against Digital Audio Watermarking: Methods, Results and Solutions

  • Chapter

Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT,volume 100)

Abstract

While a reliable protection against illegal copies does not exists today, tracking of illegal copies and prove of ownership are important detection functions, which can be realized by using passive security mechanisms of digital watermarking. Recent research has identified many watermarking algorithms for all common media types ranging from printed matter to multimedia files. The main topics of interest concentrates on transparency and robustness: The watermark must not reduce media quality and should be detectable after most common media operations and attacks. Algorithm security is discussed with regards only to key space most of the times, while especially for customer identification known as active fingerprinting specialized attacks like coalition attacks are known. Digital fingerprinting raises the additional problem that we produce different copies for each customer. Attackers can compare several fingerprinted copies to find and destroy the embedded identification string by altering the data in those places where a difference was detected. Few approaches have been introduced for image and video watermarking schemes, but there are no observations for audio fingerprinting techniques. In our paper we discuss methods for secure customer identification by digital fingerprinting for audio data. We describe first two algorithms by Boneh et al. [BoSh95] and Schwenk et al. [DBS+99] and then combine these schemes with an audio watermarking algorithm for practical evaluation of their coalition resistance to detect illegal copies. We provide test results and evaluate the security against different types of coalition attacks.

Key words

  • watermarking
  • customer authentication
  • fingerprinting algorithms
  • coalition attacks

The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35612-9_23

References

  1. Dittmann, Jana; Behr, Alexander; Stabenau, Mark; Schmitt, Peter; Schwenk, Joerg; Ueberberg, Johannes (1999), Combining digital Watermarks and collusion secure Fingerprints for digital Images, Proceedings of SPIE Vol. 3657, [365751], Electronic Imaging ‘89, San Jose USA, 24–29 January 1999.

    Google Scholar 

  2. D. Boneh and J. Shaw, Collusion-Secure Fingerprinting for Digital Data. Proc. CRYPTO’95, Springer LNCS 963, S. 452–465, 1995

    MATH  Google Scholar 

  3. A. Beutelspacher and U. Rosenbaum, Projective Geometry. Cambridge University Press 1998.

    Google Scholar 

  4. Dittmann, Jana; Hauer, Enrico; Vielhauer, Claus; Schwenk, Jörg; Saar, Eva: Customer Identification for MPEG Video based on Digital Fingerprints. In: Proceedings of Advances in Multimedia Information Processing – PCM 2001, The Second IEEE Pacific Rim Conference on Multimedia, Beijing, China, Springer Verlag, Berlin, pp. 383–390, ISBN 3–540–42680–9, 2001.

    Google Scholar 

  5. J.W.P. Hirschfeld, Projective Geometries over Finite Fields. Oxford University Press, 2nd Edition 1998.

    Google Scholar 

  6. Jana Dittmann, Stephan Klink, Andreas Lang, Martin Steinebach: Wasserzeichen unterstützte Firewalls, to appear in Proc. Of Enterprise Security, Paderborn, Germany, 2002

    Google Scholar 

  7. Petitcolas, F. A. P.; Steinebach, Martin; Raynal, F.; Dittmann, Jana; Fontaine, C.; Fates, N. (2001). Public automated web–based evaluation service for watermarking schemes: StirMark Benchmark. In: Security and Watermarking of Multimedia Contents III, Ping Wah Wong, Edward J. Delp III, Editors, Proceedings of SPIE Vol. 4314, pp. 575–584, ISBN 0–8194–3992–4, 2001.

    Google Scholar 

  8. Steinebach, Martin; Petitcolas, Fabien A. P.; Raynal, Frederic; Dittmann, Jana; Fontaine, Caroline; Seibel, Christian; Fates, Nazim; Croce Ferri, Lucilla (2001). StirMark Benchmark: Audio watermarking attacks. In: Int. Conference on Information Technology: Coding and Computing (ITCC 2001), April 2–4, Las Vegas, Nevada, pp. 49–54, ISBN 0–7695–1062–0, 2001.

    Google Scholar 

  9. Steinebach, Martin; Lang, Andreas; Dittmann, Jana, “StirMark Benchmark: Audio watermarking attacks based on lossy compression”, Photonics West 2002, 19–25 January 2002, Electronic Imaging 2002: Science and Technology; Multimedia Processing and Applications, Security and Watermarking of Multimedia Contents IV, San Jose, CA, USA [SMBM] .

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2002 IFIP International Federation for Information Processing

About this chapter

Cite this chapter

Steinebach, M., Dittmann, J., Saar, E. (2002). Combined Fingerprinting Attacks Against Digital Audio Watermarking: Methods, Results and Solutions. In: Jerman-Blažič, B., Klobučar, T. (eds) Advanced Communications and Multimedia Security. IFIP — The International Federation for Information Processing, vol 100. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35612-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-35612-9_15

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4757-4405-7

  • Online ISBN: 978-0-387-35612-9

  • eBook Packages: Springer Book Archive