DocumentCode :
1308045
Title :
Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
Author :
Holliman, Matthew ; Memon, Nasir
Author_Institution :
Microcomputer Res. Labs., Intel Corp., Santa Clara, CA, USA
Volume :
9
Issue :
3
fYear :
2000
fDate :
3/1/2000 12:00:00 AM
Firstpage :
432
Lastpage :
441
Abstract :
We describe a class of attacks on certain block-based oblivious watermarking schemes. We show that oblivious watermarking techniques that embed information into a host image in a block-wise independent fashion are vulnerable to a counterfeiting attack. Specifically, given a watermarked image, one can forge the watermark it contains into another image without knowing the secret key used for watermark insertion and in some cases even without explicitly knowing the watermark. We demonstrate successful implementations of this attack on a few watermarking techniques that have been proposed in the literature. We also describe a possible solution to this problem of block-wise independence that makes our attack computationally intractable
Keywords :
discrete cosine transforms; image coding; message authentication; transform coding; DCT domain technique; computationally intractable attack; counterfeiting attacks; digital watermarking; e secret key; host image; image authentication; multimedia content; oblivious block-wise independent invisible watermarking; watermark forgery; watermark insertion; watermarked image; watermarking; Authentication; Bandwidth; Counterfeiting; Data mining; Detection algorithms; Image coding; Protection; Robustness; Signal processing; Watermarking;
fLanguage :
English
Journal_Title :
Image Processing, IEEE Transactions on
Publisher :
ieee
ISSN :
1057-7149
Type :
jour
DOI :
10.1109/83.826780
Filename :
826780
Link To Document :
بازگشت