DocumentCode :
857203
Title :
Noniterative Algorithms for Sensitivity Analysis Attacks
Author :
El Choubassi, Maha ; Moulin, Pierre
Author_Institution :
Image Formation & Process. Group, Illinois Univ., Urbana, IL
Volume :
2
Issue :
2
fYear :
2007
fDate :
6/1/2007 12:00:00 AM
Firstpage :
113
Lastpage :
126
Abstract :
Sensitivity analysis attacks constitute a powerful family of watermark "removal" attacks. They exploit vulnerability in some watermarking protocols: the attacker\´s unlimited access to the watermark detector. This paper proposes a mathematical framework for designing sensitivity analysis attacks and focuses on additive spread-spectrum embedding schemes. The detectors under attack range in complexity from basic correlation detectors to normalized correlation detectors and maximum-likelihood (ML) detectors. The new algorithms precisely estimate and then eliminate the watermark from the watermarked signal. This is accomplished by exploiting geometric properties of the detection boundary and the information leaked by the detector. Several important extensions are presented, including the case of a partially unknown detection function, and the case of constrained detector inputs. In contrast with previous art, our algorithms are noniterative and require, at most, O(n) detection operations in order to precisely estimate the watermark, where n is the dimension of the signal. The cost of each detection operation is O(n); hence, the algorithms can be executed in quadratic time. The method is illustrated with an application to image watermarking using an ML detector based on a generalized Gaussian model for images
Keywords :
Gaussian processes; correlation methods; image coding; maximum likelihood detection; watermarking; additive spread-spectrum embedding schemes; correlation detectors; generalized Gaussian model; image watermarking; maximum-likelihood detectors; noniterative algorithms; normalized correlation detectors; sensitivity analysis attacks; watermark removal attacks; watermarked signal; watermarking protocols; Access protocols; Additives; Art; Detectors; Leak detection; Maximum likelihood detection; Maximum likelihood estimation; Sensitivity analysis; Spread spectrum communication; Watermarking; Generalized Gaussian distribution; maximum likelihood; parametric detector; quantization effects; security; sensitivity attacks; spread spectrum (SS); watermarking;
fLanguage :
English
Journal_Title :
Information Forensics and Security, IEEE Transactions on
Publisher :
ieee
ISSN :
1556-6013
Type :
jour
DOI :
10.1109/TIFS.2007.897276
Filename :
4202558
Link To Document :
بازگشت