Skip to main content

Replacement Attack on Arbitrary Watermarking Systems

  • Conference paper
Digital Rights Management (DRM 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2696))

Included in the following conference series:

Abstract

Billions of dollars allegedly lost to piracy of multimedia have recently triggered the industry to rethink the way music and movies are distributed. As encryption is vulnerable to re-recording, currently all copyright protection mechanisms tend to rely on watermarking. A watermark is an imperceptive secret hidden into a host signal. In this paper, we analyze the security of multimedia copyright protection systems that use watermarks by proposing a new breed of attacks on generic watermarking systems. A typical replacement attack relies upon the observation that multimedia content is often highly repetitive. Thus, the attack procedure replaces each signal block with another, perceptually similar block computed as a combination of other similar blocks found either within the same media clip or within a library of media clips. Assuming the blocks used to compute the replacement are marked with distinct secrets, we show that if the computed replacement block is at some minimal distance from the original marked block, large portion of the embedded watermark is irreversibly removed. We describe the logistics of the attack and an exemplary implementation against a spread-spectrum data hiding technology for audio signals.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Patrizio, A.: DVD piracy: It can be done. November 1 (1999), http://www.wired.com/news/technology/0,1282,32249,00.html

  2. Secure Digital Music Initiative, http://www.sdmi.org

  3. The DVD Copy Control Association, http://www.dvdcca.org

  4. Kirovski, D., Malvar, H., Yacobi, Y.: A dual watermarking and fingerprinting system, Tech. Rep. MSR-TR-2001-57, Microsoft Research (June 2001)

    Google Scholar 

  5. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: [11], pp. 218–238

    Google Scholar 

  6. Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. In: [12], pp. 183–206

    Google Scholar 

  7. Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47(4), 1423–1443 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  8. Kirovski, D., Malvar, H.: Robust covert communication over a public audio channel using spread spectrum. In: [14], pp. 354–368

    Google Scholar 

  9. Malvar, H.: A modulated complex lapped transform and its application to audio processing. In: International Conference on Acoustics, Speech, and Signal Processing, Phoenix, Arizona, USA, March 1999, pp. 1421–1424 (1999)

    Google Scholar 

  10. Mıhçak, M.K.: Personal Communication

    Google Scholar 

  11. Aucsmith, D. (ed.): IH 1998. LNCS, vol. 1525. Springer, Heidelberg (1998)

    Google Scholar 

  12. Anderson, R. (ed.): IH 1996. LNCS, vol. 1174. Springer, Heidelberg (1996)

    Google Scholar 

  13. Wong, P.W., Delp, E.J. (eds.): Security and Watermarking of Multimedia Contents II, San Jose, California, U.S.A, January 24–26, vol. 3971. The Society for Imaging Science and Technology (IS&T)/The International Society for Optical Engineering (SPIE). SPIE, Washington (2000)

    Google Scholar 

  14. Moskowitz, I.S. (ed.): IH 2001. LNCS, vol. 2137. Springer, Heidelberg (2001)

    MATH  Google Scholar 

  15. Gibson, J.D., Berger, T., Lindbergh, D., Baker III, R.L.: Digital Compression for Multimedia: Principles and Standards. Morgan Kaufmann Publishers, San Francisco (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kirovski, D., Petitcolas, F.A.P. (2003). Replacement Attack on Arbitrary Watermarking Systems. In: Feigenbaum, J. (eds) Digital Rights Management. DRM 2002. Lecture Notes in Computer Science, vol 2696. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-44993-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-44993-5_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40410-1

  • Online ISBN: 978-3-540-44993-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics