New sensitivity analysis attack

Maha El Choubassi, Pierre Moulin

Research output: Contribution to journalConference article

Abstract

The sensitivity analysis attacks by Kalker et al. constitute a known family of watermark removal attacks exploiting a vulnerability in some watermarking protocols: the attacker's unlimited access to the watermark detector. In this paper, a new attack on spread spectrum schemes is designed. We first examine one of Kalker's algorithms and prove its convergence using the law of large numbers, which gives more insight into the problem. Next, a new algorithm is presented and compared to existing ones. Various detection algorithms are considered including correlation detectors and normalized correlation detectors, as well as other, more complicated algorithms. Our algorithm is noniterative and requires at most n + 1 operations, where n is the dimension of the signal. Moreover, the new approach directly estimates the watermark by exploiting the simple geometry of the detection boundary and the information leaked by the detector.

Original languageEnglish (US)
Article number72
Pages (from-to)734-745
Number of pages12
JournalProceedings of SPIE - The International Society for Optical Engineering
Volume5681
DOIs
StatePublished - Jul 21 2005
EventProceedings of SPIE-IS and T Electronic Imaging - Security, Steganography, and Watermarking of Multimedia Contents VII - San Jose, CA, United States
Duration: Jan 17 2005Jan 20 2005

Fingerprint

sensitivity analysis
attack
Sensitivity analysis
Sensitivity Analysis
Attack
Watermark
Correlation detectors
Detector
detectors
Detectors
Boundary Detection
Spread Spectrum
vulnerability
Law of large numbers
edge detection
Watermarking
Vulnerability
Geometry
estimates
geometry

Keywords

  • Copyright protection
  • Sensitivity analysis attacks
  • Spread spectrum
  • Watermarking

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Condensed Matter Physics
  • Computer Science Applications
  • Applied Mathematics
  • Electrical and Electronic Engineering

Cite this

New sensitivity analysis attack. / El Choubassi, Maha; Moulin, Pierre.

In: Proceedings of SPIE - The International Society for Optical Engineering, Vol. 5681, 72, 21.07.2005, p. 734-745.

Research output: Contribution to journalConference article

@article{e5279a00c8ca4827a244cee30ee3a462,
title = "New sensitivity analysis attack",
abstract = "The sensitivity analysis attacks by Kalker et al. constitute a known family of watermark removal attacks exploiting a vulnerability in some watermarking protocols: the attacker's unlimited access to the watermark detector. In this paper, a new attack on spread spectrum schemes is designed. We first examine one of Kalker's algorithms and prove its convergence using the law of large numbers, which gives more insight into the problem. Next, a new algorithm is presented and compared to existing ones. Various detection algorithms are considered including correlation detectors and normalized correlation detectors, as well as other, more complicated algorithms. Our algorithm is noniterative and requires at most n + 1 operations, where n is the dimension of the signal. Moreover, the new approach directly estimates the watermark by exploiting the simple geometry of the detection boundary and the information leaked by the detector.",
keywords = "Copyright protection, Sensitivity analysis attacks, Spread spectrum, Watermarking",
author = "{El Choubassi}, Maha and Pierre Moulin",
year = "2005",
month = "7",
day = "21",
doi = "10.1117/12.587901",
language = "English (US)",
volume = "5681",
pages = "734--745",
journal = "Proceedings of SPIE - The International Society for Optical Engineering",
issn = "0277-786X",
publisher = "SPIE",

}

TY - JOUR

T1 - New sensitivity analysis attack

AU - El Choubassi, Maha

AU - Moulin, Pierre

PY - 2005/7/21

Y1 - 2005/7/21

N2 - The sensitivity analysis attacks by Kalker et al. constitute a known family of watermark removal attacks exploiting a vulnerability in some watermarking protocols: the attacker's unlimited access to the watermark detector. In this paper, a new attack on spread spectrum schemes is designed. We first examine one of Kalker's algorithms and prove its convergence using the law of large numbers, which gives more insight into the problem. Next, a new algorithm is presented and compared to existing ones. Various detection algorithms are considered including correlation detectors and normalized correlation detectors, as well as other, more complicated algorithms. Our algorithm is noniterative and requires at most n + 1 operations, where n is the dimension of the signal. Moreover, the new approach directly estimates the watermark by exploiting the simple geometry of the detection boundary and the information leaked by the detector.

AB - The sensitivity analysis attacks by Kalker et al. constitute a known family of watermark removal attacks exploiting a vulnerability in some watermarking protocols: the attacker's unlimited access to the watermark detector. In this paper, a new attack on spread spectrum schemes is designed. We first examine one of Kalker's algorithms and prove its convergence using the law of large numbers, which gives more insight into the problem. Next, a new algorithm is presented and compared to existing ones. Various detection algorithms are considered including correlation detectors and normalized correlation detectors, as well as other, more complicated algorithms. Our algorithm is noniterative and requires at most n + 1 operations, where n is the dimension of the signal. Moreover, the new approach directly estimates the watermark by exploiting the simple geometry of the detection boundary and the information leaked by the detector.

KW - Copyright protection

KW - Sensitivity analysis attacks

KW - Spread spectrum

KW - Watermarking

UR - http://www.scopus.com/inward/record.url?scp=21844452953&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=21844452953&partnerID=8YFLogxK

U2 - 10.1117/12.587901

DO - 10.1117/12.587901

M3 - Conference article

AN - SCOPUS:21844452953

VL - 5681

SP - 734

EP - 745

JO - Proceedings of SPIE - The International Society for Optical Engineering

JF - Proceedings of SPIE - The International Society for Optical Engineering

SN - 0277-786X

M1 - 72

ER -