|Table of Contents|

Sensitivity Attack to Watermarking Schemes with Nonparametric Detection Boundaries

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

Issue:
2008年03期
Page:
291-294
Research Field:
Publishing date:

Info

Title:
Sensitivity Attack to Watermarking Schemes with Nonparametric Detection Boundaries
Author(s):
ZHAO Qi-yangYIN Bao-lin
National Laboratory of Software Development Environment,Beijing University of Aeronautics and Astronautics,Beijing 100083,China
Keywords:
digital watermarking sensitivity attack detection boundary nonparametrization
PACS:
TP393.08
DOI:
-
Abstract:
The signals from which sensitivity attacks are launched directly determine the computational errors in attacks.With mathematical models on the accuracy of watermark estimations,it is shown more accurate to estimate watermarks from high-detection-value signals with fixed absolute errors.For watermarking schemes with nonparametric detection boundaries,sensitivity attacks directly launched from object signals can eliminate the negative effect of disordered boundaries,and the improved attack is proved effective in removing watermarks there.

References:

[1] Cox J, Linnartz J. Som e g eneralm ethods fo r tamper ing w ith w aterm arks [ J]. IEEE J Se l A reas Comm un, 1998, 16( 4): 587- 593.
[2] L innartz J, v an D ijkM. Ana lysis of the sensitiv ity at?? tack aga inst electronic wa term arks in im ages [ A ]. Pro c 2nd Int Wo rkshop Inform a tion H iding, Lecture No tes in Compu ter Sc ience [ C ]. Berlin, Germ any: Springer, 1998. 258- 272.
[3] V enturini I. O rac le attacks and cove rt channe ls [ A ]. Pro c 4th IntW orkshop D ig ita lW aterm arking, Lecture No tes in Compu ter Sc ience [ C ]. Berlin, Germ any: Springer, 2005. 171- 185.
[4] Com esa?na P, P??rez??Fre ire L, Prez??Gonz?? lez F. The re turn of the sens itiv ity attack [ A ] . Proc 4th Int W orkshop D ig ita l W a term ark ing, Lecture Notes in Com puter Science [ C ] . Berlin, Germ any: Springer, 2005. 260- 274.
[5] K alker T, Linnartz J, van D ijkM. W aterm ark estima?? tion through detector ana lysis [ A]. Proc IEEE Int Con f Im age Processing [ C]. New York, USA: IEEE Press, 1998. 425- 429.
[6] M ansourM, Tew fik A. LMS??based attack on wa terma rk public detectors [ A]. Proc IEEE Int Conf Im age Pro?? cessing [ C]. New York, USA: IEEE SP Press, 2002. 649- 652.
[7] ChoubassiM, Mou lin P. New sensitivity analysis at?? tack [ A]. Security, Steganog raphy andW aterm ark ing ofMu ltim ed ia contents VII [ C]. Be llingham, USA: SPIE, 2005. 734- 745.
[8] P??rez??Fre ire L, Comesa?na P, Troncoso??Pastor iza J. W a?? termarking secur ity: A survey [ J]. Trans on DHMS, Lecture No tes in Computer Sc ience, 2006, 4 300( 1): 41 - 72.
[9] 王执铨, 戴跃伟, 茅耀斌, 等. 一种基于HVS 的小 波水印方案[ J]. 南京理工大学学报(自然科学版), 2001, 25( 3): 263- 268.
[10] Barn iM, Barto lini F, Cappe llin i V. A DCT??dom a in system for robust im age wa term ark ing [ J]. S ignal Pro?? cessing, 1998, 66( 1): 357- 372. 332

Memo

Memo:
-
Last Update: 2008-06-30