Abstract
This paper considers the problem of the inversion attack. We discuss a relation of a copyright owner and an attacker on an equal footing, the problem of the assumption of robustness, and the quantization error as a one-way function. Using an improved two-stage watermarking system, a framework that invalidates an inversion attack is proposed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Craver, S., Memon, N., Yeo, B.-L., Yeung, M.M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications. IEEE Journal on Selected Areas in Communications 16(4), 573–586 (1998)
Hartung, F., Su, J.K., Girod, B.: Spread spectrum watermarking: Malicious attacks and counter attacks. In: SPIE Proceedings, April 9, vol. 3657 (1999) ISBN: 9780819431288
Craver, S.: Zero Knowledge Watermark Detection. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 101–116. Springer, Heidelberg (2000)
Adelsbach, A., Katzenbeisser, S., Veith, H.: Watermarking Schemes Provably Secure against Copy and Ambiguity Attacks. In: Proceedings of the 3rd ACM workshop on Digital rights management (DRM 2003 ), October 27-30, pp. 111–119. ACM, Washington, DC (2003)
Liu, R., Tan, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Transactions on Multimedia 4(1), 121–128 (2002)
Adelsbach, A., Katzenbeisser, S., Sadeghi, A.-R.: On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 355–369. Springer, Heidelberg (2004)
Ohzeki, K., Sakurai, M.: SVD-Based Watermark with Quasi-One Way Operation by Reducing a Singular Value Matrix Rank. In: Proc. of the First International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-forensics, Technical session B4. Watermarking, 1. January 21-23, Adelaide (2008)
Ohzeki, K., Wei, Y.: A New Watermarking System with Obfuscated Embedder and Quasi-Chirp Transform, IPSJ Tech. report Vol. 2011-CSEC-52 No.29 pp.1-10 (March 2011) (in Japanese)
Ohzeki, K., Wei, Y., Hirakawa, Y., Sato, K.: A New Watermarking Method with Obfuscated Quasi-Chirp Transform. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 57–71. Springer, Heidelberg (2012)
Kang, X., Huang, J., Zeng, W., Shi, Y.Q.: Non-ambiguity of blind watermarking: a revisit with analytical resolution. Science in China Series F: Information Sciences 52(2), 276–285 (2009)
Ohzeki, K., Seo, Y., Gi, E.: Discontinuity of SVD Embedding Mapping Used for Watermarks. In: Meersman, R., Herrero, P., Dillon, T. (eds.) OTM 2009 Workshops. LNCS, vol. 5872, pp. 4–5. Springer, Heidelberg (2009)
Ohzeki, K., Seo, Y., Gi, E.: Numerical Analysis of Continuity of Quasi-One-way Mapping Developed for Watermarking, IPSJ SIG. Tech. Report Vol. 2009-CSEC-45 No.5 pp.1-8 (May 2009) (in Japanese)
Moulin, P.: Comments on “Why watermarking is nonsense”. IEEE Signal Processing Magazine 20(6), 57–59 (2003)
Kutter, M., Voloshynovskiy, S.V., Herrigel, A.: The Watermark copy attack. In: Proc., of SPIE, Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 371–930 (January 2000)
Ohzeki, K., Wei, Y.: An Obfuscation Method for a Detector of Watermarking, IPSJ SIG. Tech. Report vol. 2010-CSEC-48, No.26, pp.1–7 (March 2010) (in Japanese)
Watanabe, Y.: A Note on Numerical Computation and Speed. Advanced Computing Infrastructure Section, Research Institute for Information Technology 28(3), 207–231 (1995) (in Japanese), http://yebisu.cc.kyushu-u.ac.jp/~watanabe/RESERCH/MANUSCRIPT/KOHO/SPEED/speed.pdf
Yamamoto, Y.: Accelerating the Singular Value Decomposition of Rectangular Matrices using CUDA. Lecture Class and Workshop on GPGPU (June 24, 2009) (in Japanese), http://suchix.kek.jp/bridge/CUDA09/Docs/yamamoto_090624.ppt
Kusuhara, F.: Numerical Computation Library (old), Linear Algebra in kusuhara’s wiki (in Japanese), http://www.rcs.arch.t.u-tokyo.ac.jp/kusuhara/fswiki/wiki.cgi?action=CATEGORY&category=Linear+Algebra
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ohzeki, K., Wei, Y., Hirakawa, Y., Sato, K. (2013). Consideration of the Watermark Inversion Attack and Its Invalidation Framework. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-642-40099-5_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40098-8
Online ISBN: 978-3-642-40099-5
eBook Packages: Computer ScienceComputer Science (R0)