Abstract
Billions of dollars allegedly lost to piracy of multimedia have recently triggered the industry to rethink the way music and movies are distributed. As encryption is vulnerable to re-recording, currently all copyright protection mechanisms tend to rely on watermarking. A watermark is an imperceptive secret hidden into a host signal. In this paper, we analyze the security of multimedia copyright protection systems that use watermarks by proposing a new breed of attacks on generic watermarking systems. A typical replacement attack relies upon the observation that multimedia content is often highly repetitive. Thus, the attack procedure replaces each signal block with another, perceptually similar block computed as a combination of other similar blocks found either within the same media clip or within a library of media clips. Assuming the blocks used to compute the replacement are marked with distinct secrets, we show that if the computed replacement block is at some minimal distance from the original marked block, large portion of the embedded watermark is irreversibly removed. We describe the logistics of the attack and an exemplary implementation against a spread-spectrum data hiding technology for audio signals.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Patrizio, A.: DVD piracy: It can be done. November 1 (1999), http://www.wired.com/news/technology/0,1282,32249,00.html
Secure Digital Music Initiative, http://www.sdmi.org
The DVD Copy Control Association, http://www.dvdcca.org
Kirovski, D., Malvar, H., Yacobi, Y.: A dual watermarking and fingerprinting system, Tech. Rep. MSR-TR-2001-57, Microsoft Research (June 2001)
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Attacks on copyright marking systems. In: [11], pp. 218–238
Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: A secure, robust watermark for multimedia. In: [12], pp. 183–206
Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Transactions on Information Theory 47(4), 1423–1443 (2001)
Kirovski, D., Malvar, H.: Robust covert communication over a public audio channel using spread spectrum. In: [14], pp. 354–368
Malvar, H.: A modulated complex lapped transform and its application to audio processing. In: International Conference on Acoustics, Speech, and Signal Processing, Phoenix, Arizona, USA, March 1999, pp. 1421–1424 (1999)
Mıhçak, M.K.: Personal Communication
Aucsmith, D. (ed.): IH 1998. LNCS, vol. 1525. Springer, Heidelberg (1998)
Anderson, R. (ed.): IH 1996. LNCS, vol. 1174. Springer, Heidelberg (1996)
Wong, P.W., Delp, E.J. (eds.): Security and Watermarking of Multimedia Contents II, San Jose, California, U.S.A, January 24–26, vol. 3971. The Society for Imaging Science and Technology (IS&T)/The International Society for Optical Engineering (SPIE). SPIE, Washington (2000)
Moskowitz, I.S. (ed.): IH 2001. LNCS, vol. 2137. Springer, Heidelberg (2001)
Gibson, J.D., Berger, T., Lindbergh, D., Baker III, R.L.: Digital Compression for Multimedia: Principles and Standards. Morgan Kaufmann Publishers, San Francisco (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kirovski, D., Petitcolas, F.A.P. (2003). Replacement Attack on Arbitrary Watermarking Systems. In: Feigenbaum, J. (eds) Digital Rights Management. DRM 2002. Lecture Notes in Computer Science, vol 2696. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-44993-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-540-44993-5_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40410-1
Online ISBN: 978-3-540-44993-5
eBook Packages: Springer Book Archive