Skip to main content

How to Combat Block Replacement Attacks?

  • Conference paper
Information Hiding (IH 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3727))

Included in the following conference series:

Abstract

Block replacement attacks consist in exploiting the redundancy of the host signal to replace each signal block with another one or a combination of other ones. Such an attacking strategy has been recognized to be a major threat against watermarking systems e.g. additive spread-spectrum and quantization index modulation algorithms. In this paper, a novel embedding strategy will be introduced to circumvent this attack. The basic idea is to make the watermark inherit the self-similarities from the host signal. This can be achieved by imposing a linear structure on the watermark in a feature space e.g. the Gabor space. The relationship with existing multiplicative watermarking schemes will also be exhibited. Finally, experimental results will be presented and directions for future work will be discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann Publishers, San Francisco (2001)

    Google Scholar 

  2. DVD Copy Control Association: http://www.dvdcca.org

  3. Secure Digital Music Initiative: http://www.sdmi.org

  4. Cayre, F., Fontaine, C., Furon, T.: Watermarking security, part I: Theory. In: Proceedings of SPIE Security, Steganography and Watermarking of Multimedia Contents VII, vol. 5681, pp. 746–757 (2005)

    Google Scholar 

  5. Cayre, F., Fontaine, C., Furon, T.: Watermarking security, part II: Practice. In: Proceedings of SPIE Security, Steganography and Watermarking of Multimedia Contents VII. vol. 5681, pp. 758–768 (2005)

    Google Scholar 

  6. Su, K., Kundur, D., Hatzinakos, D.: A novel approach to collusion resistant video watermarking. In: Proceedings of SPIE Security and Watermarking of Multimedia Contents IV. vol. 4675, pp. 491–502 (2002)

    Google Scholar 

  7. Doërr, G., Dugelay, J.-L.: Collusion issue in video watermarking. In: Proceedings of SPIE Security, Steganography and Watermarking of Multimedia Contents VII, vol. 5681, pp. 685–696 (2005)

    Google Scholar 

  8. Doërr, G., Dugelay, J.-L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Transactions on Signal Processing, Supplement on Secure Media 52, 2955–2964 (2004)

    Article  Google Scholar 

  9. Kirovski, D., Petitcolas, F.: Blind pattern matching attack on watermarking systems. IEEE Transactions on Signal Processing 51, 1045–1053 (2003)

    Article  MathSciNet  Google Scholar 

  10. Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6, 1673–1687 (1997)

    Article  Google Scholar 

  11. Barni, M., Bartolini, F., De Rosa, A., Piva, A.: A new decoder for optimum recovery of nonadditive watermarks. IEEE Transactions on Image Processing 10, 755–766 (2001)

    Article  Google Scholar 

  12. Fisher, Y.: Fractal Image Compression: Theory and Applications. Springer, Heidelberg (1994)

    Google Scholar 

  13. Rey, C., Doërr, G., Dugelay, J.-L., Csurka, G.: Toward generic image dewatermarking? In: Proceedings of the IEEE International Conference on Image Processing, vol. III, pp. 633–636 (2002)

    Google Scholar 

  14. Petitcolas, F., Kirovski, D.: The blind pattern matching attack on watermarking systems. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. IV, pp. 3740–3743 (2002)

    Google Scholar 

  15. Kirovski, D., Petitcolas, F.: Replacement attack on arbitrary watermarking systems. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 177–189. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  16. Doërr, G., Dugelay, J.-L., Grangé, L.: Exploiting self-similarities to defeat digital watermarking systems - a case study on still images. In: Proceedings of the ACM Multimedia and Security Workshop, pp. 133–142 (2004)

    Google Scholar 

  17. Voloshynovskiy, S., Herrigel, A., Baumgärtner, N., Pun, T.: A stochastic approach to content adaptive digital image watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 211–236. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  18. Daugman, J.: Complete discrete 2-D Gabor transforms by neural network for image analysis and compression. IEEE Transactions on Acoustics, Speech and Signal Processing 36, 1169–1179 (1988)

    Article  MATH  Google Scholar 

  19. Dunn, D., Higgins, W., Wakeley, J.: Texture segmentation using 2-D Gabor elementary functions. IEEE Transactions on Pattern Analysis and Machine Intelligence 16, 130–149 (1994)

    Article  Google Scholar 

  20. Duc, B., Fisher, S., Bigün, J.: Face authentication with Gabor information on deformable graphs. IEEE Transactions on Image Processing 8, 504–516 (1999)

    Article  Google Scholar 

  21. Donato, G., Bartlett, M., Hager, J., Ekman, P., Sejnowski, T.: Classifying facial actions. IEEE Transactions on Pattern Analysis and Machine Intelligence 21, 974–989 (1999)

    Article  Google Scholar 

  22. Ringach, D.: Spatial structure and symmetry of simple-cell receptive fields in macaque primary visual cortex. Journal of Neurophysiology 88, 455–463 (2002)

    Google Scholar 

  23. Lim, J.: Two-Dimensional Signal and Image Processing. Prentice Hall International Editions (1989)

    Google Scholar 

  24. Foley, J., Legge, G.: Contrast masking in human vision. Journal of the Optical Society of America 70, 1458–1470 (1980)

    Article  Google Scholar 

  25. Doërr, G., Dugelay, J.-L.: A countermeasure to resist block replacement attacks. In: Accepted for publication in the IEEE International Conference on Image Processing (2005)

    Google Scholar 

  26. Eggers, J., Girod, B.: Informed Watermarking. Kluwer Academic Publishers, Dordrecht (2002)

    Google Scholar 

  27. Cheng, Q., Huang, T.: Robust optimum detection of transform domain multiplicative watermarks. IEEE Transactions on Signal Processing 51, 906–924 (2003)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Doërr, G., Dugelay, JL. (2005). How to Combat Block Replacement Attacks?. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds) Information Hiding. IH 2005. Lecture Notes in Computer Science, vol 3727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558859_13

Download citation

  • DOI: https://doi.org/10.1007/11558859_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29039-1

  • Online ISBN: 978-3-540-31481-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics