Skip to main content

Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy

  • Conference paper
Digital Watermarking (IWDW 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3710))

Included in the following conference series:

Abstract

Multimedia digital data is highly redundant: successive video frames are very similar in a movie clip, most songs contain some repetitive patterns, etc. This property can consequently be exploited to successively replace each part of the signal with a similar one taken from another location in the same signal or with a combination of similar parts. Such an approach is all the more pertinent when video content is considered since such signals exhibit both temporal and spatial self-similarities. To counter such attacking strategies, it is necessary to ensure that embedded watermarks are coherent with the redundancy of the host content. To this end, both motion-compensated watermarking and self-similarities inheritance will be surveyed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cox, I., Miller, M., Bloom, J.: Digital Watermarking. Morgan Kaufmann, San Francisco (2001)

    Google Scholar 

  2. DVD Copy Control Association, http://www.dvdcca.org

  3. Secure Digital Music Initiative, http://www.sdmi.org

  4. Su, K., Kundur, D., Hatzinakos, D.: A novel approach to collusion resistant video watermarking. In: Security and Watermarking of Multimedia Contents IV. Proceedings of SPIE, vol. 4675, pp. 491–502 (2002)

    Google Scholar 

  5. Doërr, G., Dugelay, J.L.: Collusion issue in video watermarking. In: Security, Steganography and Watermarking of Multimedia Contents VII. Proceedings of SPIE, vol. 5681, pp. 685–696 (2005)

    Google Scholar 

  6. Cayre, F., Fontaine, C., Furon, T.: Watermarking security, part I: Theory. In: Security, Steganography and Watermarking of Multimedia Contents VII. Proceedings of SPIE, vol. 5681, pp. 746–757 (2005)

    Google Scholar 

  7. Cayre, F., Fontaine, C., Furon, T.: Watermarking security, part II: Practice. In: Security, Steganography and Watermarking of Multimedia Contents VII. Proceedings of SPIE, vol. 5681, pp. 758–768 (2005)

    Google Scholar 

  8. Doërr, G., Dugelay, J.L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Transactions on Signal Processing, Supplement on Secure Media 52, 2955–2964 (2004)

    Article  Google Scholar 

  9. Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Processing 66, 283–301 (1998)

    Article  MATH  Google Scholar 

  10. Doërr, G., Dugelay, J.L.: A guide tour of video watermarking. Signal Processing: Image Communication, Special Issue on Technologies for Image Security 18, 263–282 (2003)

    Google Scholar 

  11. Doërr, G., Dugelay, J.L.: New intra-video collusion attack using mosaicing. In: Proceedings of the IEEE International Conference on Multimedia and Expo., vol. II, pp. 505–508 (2003)

    Google Scholar 

  12. Doërr, G., Dugelay, J.L.: Secure background watermarking based on video mosaicing. In: Security, Steganography and Watermarking of Multimedia Contents VI. Proceedings of SPIE, vol. 5306, pp. 304–314 (2004)

    Google Scholar 

  13. Smolic, A., Lorei, M., Sikora, T.: Adaptive kalman-filtering for prediction and global motion parameter tracking of segments in video. In: Proceedings of the Picture Coding Symposium (1996)

    Google Scholar 

  14. Nicolas, H., Labit, C.: Motion and illumination variation estimation using a hierarchy of models: Application to image sequence coding. Journal of Visual Communication and Image Representation 6, 303–316 (1995)

    Article  Google Scholar 

  15. Szeliski, R., Shum, H.Y.: Creating full view panoramic image mosaics and environment maps. In: Proceedings of the International Conference on Computer Graphics and Interactive Techniques, pp. 251–258 (1997)

    Google Scholar 

  16. Sun, Z., Tekalp, M.: Trifocal motion modeling for object-based video compression and manipulation. IEEE Journal on Circuits and Systems for Video Technology 8, 667–685 (1998)

    Article  Google Scholar 

  17. Koenen, R.: MPEG-4 overview. In: JTC1/SC29/WG11 N4668, ISO/IEC (2002)

    Google Scholar 

  18. Fisher, Y.: Fractal Image Compression: Theory and Applications. Springer, Heidelberg (1994)

    Google Scholar 

  19. Rey, C., Doërr, G., Dugelay, J.L., Csurka, G.: Toward generic image dewatermarking? In: Proceedings of the IEEE International Conference on Image Processing, vol. III, pp. 633–636 (2002)

    Google Scholar 

  20. Petitcolas, F., Kirovski, D.: The blind pattern matching attack on watermarking systems. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. IV, pp. 3740–3743 (2002)

    Google Scholar 

  21. Kirovski, D., Petitcolas, F.: Blind pattern matching attack on watermarking systems. IEEE Transactions on Signal Processing 51, 1045–1053 (2003)

    Article  MathSciNet  Google Scholar 

  22. Kirovski, D., Petitcolas, F.: Replacement attack on arbitrary watermarking systems. In: Feigenbaum, J. (ed.) DRM 2002. LNCS, vol. 2696, pp. 177–189. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  23. Doërr, G., Dugelay, J.L., Grangé, L.: Exploiting self-similarities to defeat digital watermarking systems - a case study on still images. In: Proceedings of the ACM Multimedia and Security Workshop, pp. 133–142 (2004)

    Google Scholar 

  24. Holliman, M., Macy, W., Yeung, M.: Robust frame-dependent video watermarking. In: Security and Watermarking of Multimedia Contents II. Proceedings of SPIE, vol. 3971, pp. 186–197 (2000)

    Google Scholar 

  25. Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceedings of the International Conference on Information Technology: Coding and Computing, pp. 178–183 (2000)

    Google Scholar 

  26. Delannay, D., Macq, B.: A method for hiding synchronization marks in scale and rotation resilient watermarking schemes. In: Security and Watermarking of Multimedia Contents IV. Proceedings of SPIE, vol. 4675, pp. 548–554 (2002)

    Google Scholar 

  27. Irani, M., Anandan, P., Bergen, J., Kumar, R., Hsu, S.: Mosaic representations of video sequences and their applications. Signal Processing: Image Communication 8, 327–351 (1996)

    Article  Google Scholar 

  28. Bas, P., Macq, B.: A new video-object watermarking scheme robust to object manipulation. In: Proceedings of the IEEE International Conference on Image Processing, vol. II, pp. 526–529 (2001)

    Google Scholar 

  29. Hartung, F., Eisert, P., Girod, B.: Digital watermarking of MPEG-4 facial animation parameters. Computers & Graphics 22, 425–435 (1998)

    Article  Google Scholar 

  30. Garcia, E., Dugelay, J.L.: Texture-based watermarking of 3D video objects. IEEE Transactions on Circuits and Systems for Video Technology 13, 853–866 (2003)

    Article  Google Scholar 

  31. Visual Quality Expert Group (VQEG), http://www.vqeg.org

  32. Macy, W., Holliman, M.: Quality evaluation of watermarked video. In: Security and Watermarking of Multimedia Contents II. Proceedings of SPIE, vol. 3971, pp. 486–500 (2000)

    Google Scholar 

  33. Winkler, S., Gelasca, E., Ebrahimi, T.: Towards perceptual metrics for video watermark evaluation. In: Applications of Digital Image Processing. Proceedings of SPIE, vol. 5203, pp. 371–378 (2003)

    Google Scholar 

  34. Doërr, G.: Security Issue and Collusion Attacks in Video Watermarking. PhD thesis, Université de Nice Sophia-Antipolis, France (2005)

    Google Scholar 

  35. Voloshynovskiy, S., Herrigel, A., Baumgärtner, N., Pun, T.: A stochastic approach to content adaptive digital image watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 211–236. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  36. Doërr, G., Dugelay, J.L.: How to combat block replacement attacks? In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 161–175. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  37. Barni, M., Bartolini, F., De Rosa, A., Piva, A.: A new decoder for optimum recovery of nonadditive watermarks. IEEE Transactions on Image Processing 10, 755–766 (2001)

    Article  Google Scholar 

  38. Cox, I., Kilian, J., Leighton, T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6, 1673–1687 (1997)

    Article  Google Scholar 

  39. Foley, J., Legge, G.: Contrast masking in human vision. Journal of the Optical Society of America 70, 1458–1470 (1980)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Doërr, G., Dugelay, JL. (2005). Countermeasures for Collusion Attacks Exploiting Host Signal Redundancy. In: Barni, M., Cox, I., Kalker, T., Kim, HJ. (eds) Digital Watermarking. IWDW 2005. Lecture Notes in Computer Science, vol 3710. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11551492_17

Download citation

  • DOI: https://doi.org/10.1007/11551492_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28768-1

  • Online ISBN: 978-3-540-32052-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics