Share Email Print
cover

Proceedings Paper

New sensitivity analysis attack
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

The sensitivity analysis attacks by Kalker et al. constitute a known family of watermark removal attacks exploiting a vulnerability in some watermarking protocols: the attacker's unlimited access to the watermark detector. In this paper, a new attack on spread spectrum schemes is designed. We first examine one of Kalker's algorithms and prove its convergence using the law of large numbers, which gives more insight into the problem. Next, a new algorithm is presented and compared to existing ones. Various detection algorithms are considered including correlation detectors and normalized correlation detectors, as well as other, more complicated algorithms. Our algorithm is noniterative and requires at most n+1 operations, where n is the dimension of the signal. Moreover, the new approach directly estimates the watermark by exploiting the simple geometry of the detection boundary and the information leaked by the detector.

Paper Details

Date Published: 21 March 2005
PDF: 12 pages
Proc. SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, (21 March 2005); doi: 10.1117/12.587901
Show Author Affiliations
Maha El Choubassi, Univ. of Illinois/Urbana-Champaign (United States)
Pierre Moulin, Univ. of Illinois/Urbana-Champaign (United States)


Published in SPIE Proceedings Vol. 5681:
Security, Steganography, and Watermarking of Multimedia Contents VII
Edward J. Delp; Ping W. Wong, Editor(s)

© SPIE. Terms of Use
Back to Top