On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks

Maha El Choubassi, Pierre Moulin

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Despite their popularity, spread spectrum techniques have been proven to be vulnerable to sensitivity analysis attacks. Moreover, the number of detection operations needed by the attacker to estimate the watermark is generally linear in the size of the signal available to him. This holds not only for a simple correlation detector, but also for a wide class of detectors. Therefore there is a vital need for more secure detection methods. In this paper, we propose a randomized detection method that increases the robustness of spread spectrum embedding schemes. However, this is achieved at the expense of detection performance. For this purpose, we provide a framework to study the tradeoff between these two factors using classical detection-theoretic tools: large deviation analysis and Chernoff bounds. To gain more insight into the practical value of this framework, we apply it to image signals, for which "good" statistical models are available.

Original languageEnglish (US)
Title of host publicationSecurity, Steganography, and Watermarking of Multimedia Contents VIII - Proceedings of SPIE-IS and T Electronic Imaging
DOIs
StatePublished - 2006
EventSecurity, Steganography, and Watermarking of Multimedia Contents VIII - San Jose, CA, United States
Duration: Jan 16 2006Jan 19 2006

Publication series

NameProceedings of SPIE - The International Society for Optical Engineering
Volume6072
ISSN (Print)0277-786X

Other

OtherSecurity, Steganography, and Watermarking of Multimedia Contents VIII
Country/TerritoryUnited States
CitySan Jose, CA
Period1/16/061/19/06

Keywords

  • Generalized Gaussian hosts
  • Randomized detection
  • Security
  • Sensitivity analysis attacks
  • Spread spectrum
  • Watermarking

ASJC Scopus subject areas

  • Electronic, Optical and Magnetic Materials
  • Condensed Matter Physics
  • Computer Science Applications
  • Applied Mathematics
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'On the fundamental tradeoff between watermark detection performance and robustness against sensitivity analysis attacks'. Together they form a unique fingerprint.

Cite this