Joint detection-estimation games for sensitivity analysis attacks

Maha El Choubassi, Pierre Moulin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Sensitivity analysis attacks aim at estimating a watermark from multiple observations of the detector's output. Subsequently, the attacker removes the estimated watermark from the watermarked signal. In order to measure the vulnerability of a detector against such attacks, we evaluate the fundamental performance limits for the attacker's estimation problem. The inverse of the Fisher information matrix provides a bound on the covariance matrix of the estimation error. A general strategy for the attacker is to select the distribution of auxiliary test signals that minimizes the trace of the inverse Fisher information matrix. The watermark detector must trade off two conflicting requirements: (1) reliability, and (2) security against sensitivity attacks. We explore this tradeoff and design the detection function that maximizes the trace of the attacker's inverse Fisher information matrix while simultaneously guaranteeing a bound on the error probability. Game theory is the natural framework to study this problem, and considerable insights emerge from this analysis.

Original languageEnglish (US)
Title of host publicationMedia Forensics and Security
DOIs
StatePublished - 2009
EventMedia Forensics and Security - San Jose, CA, United States
Duration: Jan 19 2009Jan 21 2009

Publication series

NameProceedings of SPIE - The International Society for Optical Engineering
Volume7254
ISSN (Print)0277-786X

Other

OtherMedia Forensics and Security
Country/TerritoryUnited States
CitySan Jose, CA
Period1/19/091/21/09

Keywords

  • Detection theory
  • Estimation theory
  • Fisher information
  • Game theory
  • Security
  • Sensitivity attacks

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Condensed Matter Physics
  • Computer Science Applications
  • Applied Mathematics
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Joint detection-estimation games for sensitivity analysis attacks'. Together they form a unique fingerprint.

Cite this