TY - GEN
T1 - On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks
AU - El Choubassi, Maha
AU - Moulin, Pierre
N1 - Copyright:
Copyright 2008 Elsevier B.V., All rights reserved.
PY - 2006
Y1 - 2006
N2 - Despite their popularity, spread spectrum techniques have been proven to be vulnerable to sensitivity analysis attacks. Moreover, the number of detection operations needed by the attacker to estimate the watermark is generally linear in the size of the signal available to him. This holds not only for a simple correlation detector, but also for a wide class of detectors. Therefore there is a vital need for more secure detection methods. In this paper, we propose a randomized detection method that increases the robustness of spread spectrum embedding schemes. However, this is achieved at the expense of detection performance. For this purpose, we provide a framework to study the tradeoff between these two factors using classical detection-theoretic tools: large deviation analysis and Chernoff bounds. To gain more insight into the practical value of this framework, we apply it to image signals, for which "good" statistical models are available.
AB - Despite their popularity, spread spectrum techniques have been proven to be vulnerable to sensitivity analysis attacks. Moreover, the number of detection operations needed by the attacker to estimate the watermark is generally linear in the size of the signal available to him. This holds not only for a simple correlation detector, but also for a wide class of detectors. Therefore there is a vital need for more secure detection methods. In this paper, we propose a randomized detection method that increases the robustness of spread spectrum embedding schemes. However, this is achieved at the expense of detection performance. For this purpose, we provide a framework to study the tradeoff between these two factors using classical detection-theoretic tools: large deviation analysis and Chernoff bounds. To gain more insight into the practical value of this framework, we apply it to image signals, for which "good" statistical models are available.
KW - Generalized Gaussian hosts
KW - Randomized detection
KW - Security
KW - Sensitivity analysis attacks
KW - Spread spectrum
KW - Watermarking
UR - http://www.scopus.com/inward/record.url?scp=33645698671&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33645698671&partnerID=8YFLogxK
U2 - 10.1117/12.640659
DO - 10.1117/12.640659
M3 - Conference contribution
AN - SCOPUS:33645698671
SN - 0819461121
SN - 9780819461124
T3 - Proceedings of SPIE - The International Society for Optical Engineering
BT - Security, Steganography, and Watermarking of Multimedia Contents VIII - Proceedings of SPIE-IS and T Electronic Imaging
T2 - Security, Steganography, and Watermarking of Multimedia Contents VIII
Y2 - 16 January 2006 through 19 January 2006
ER -