Share Email Print

Proceedings Paper

Spread spectrum watermarking: malicious attacks and counterattacks
Author(s): Frank H. Hartung; Jonathan K. Su; Bernd Girod
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Most watermarking methods for images and video have been proposed are based on ideas from spread spectrum radio communications, namely additive embedding of a (signal adaptive or non-adaptive) pseudo-noise watermark pattern, and watermark recovery by correlation. Even methods that are not presented as spread spectrum methods often build on these principles. Recently, some skepticism about the robustness of spread spectrum watermarks has arisen, specifically with the general availability of watermark attack software which claim to render most watermarks undetectable. In fact, spread spectrum watermarks and watermark detectors in their simplest form are vulnerable to a variety of attacks. However, with appropriate modifications to the embedding and extraction methods, spread spectrum methods can be made much more resistant against such attacks. In this paper, we review proposed attacks on spread spectrum watermarks are systematically. Further, modifications for watermark embedding and extraction are presented to avoid and counterattack these attacks. Important ingredients are, for example, to adapt the power spectrum of the watermark to the host signal power spectrum, and to employ an intelligent watermark detector with a block-wise multi-dimensional sliding correlator, which can recover the watermark even in the presence of geometric attacks.

Paper Details

Date Published: 9 April 1999
PDF: 12 pages
Proc. SPIE 3657, Security and Watermarking of Multimedia Contents, (9 April 1999); doi: 10.1117/12.344665
Show Author Affiliations
Frank H. Hartung, Univ. of Erlangen-Nuremberg (Germany)
Jonathan K. Su, Univ. of Erlangen-Nuremberg (Germany)
Bernd Girod, Univ. of Erlangen-Nuremberg (United States)

Published in SPIE Proceedings Vol. 3657:
Security and Watermarking of Multimedia Contents
Ping Wah Wong; Edward J. Delp III, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?