Skip to main content

Consideration of the Watermark Inversion Attack and Its Invalidation Framework

  • Conference paper
The International Workshop on Digital Forensics and Watermarking 2012 (IWDW 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7809))

Included in the following conference series:

  • 2077 Accesses

Abstract

This paper considers the problem of the inversion attack. We discuss a relation of a copyright owner and an attacker on an equal footing, the problem of the assumption of robustness, and the quantization error as a one-way function. Using an improved two-stage watermarking system, a framework that invalidates an inversion attack is proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Craver, S., Memon, N., Yeo, B.-L., Yeung, M.M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications. IEEE Journal on Selected Areas in Communications 16(4), 573–586 (1998)

    Article  Google Scholar 

  2. Hartung, F., Su, J.K., Girod, B.: Spread spectrum watermarking: Malicious attacks and counter attacks. In: SPIE Proceedings, April 9, vol. 3657 (1999) ISBN: 9780819431288

    Google Scholar 

  3. Craver, S.: Zero Knowledge Watermark Detection. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 101–116. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  4. Adelsbach, A., Katzenbeisser, S., Veith, H.: Watermarking Schemes Provably Secure against Copy and Ambiguity Attacks. In: Proceedings of the 3rd ACM workshop on Digital rights management (DRM 2003 ), October 27-30, pp. 111–119. ACM, Washington, DC (2003)

    Chapter  Google Scholar 

  5. Liu, R., Tan, T.: An SVD-based watermarking scheme for protecting rightful ownership. IEEE Transactions on Multimedia 4(1), 121–128 (2002)

    Article  Google Scholar 

  6. Adelsbach, A., Katzenbeisser, S., Sadeghi, A.-R.: On the Insecurity of Non-invertible Watermarking Schemes for Dispute Resolving. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 355–369. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Ohzeki, K., Sakurai, M.: SVD-Based Watermark with Quasi-One Way Operation by Reducing a Singular Value Matrix Rank. In: Proc. of the First International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-forensics, Technical session B4. Watermarking, 1. January 21-23, Adelaide (2008)

    Google Scholar 

  8. Ohzeki, K., Wei, Y.: A New Watermarking System with Obfuscated Embedder and Quasi-Chirp Transform, IPSJ Tech. report Vol. 2011-CSEC-52 No.29 pp.1-10 (March 2011) (in Japanese)

    Google Scholar 

  9. Ohzeki, K., Wei, Y., Hirakawa, Y., Sato, K.: A New Watermarking Method with Obfuscated Quasi-Chirp Transform. In: Shi, Y.Q., Kim, H.-J., Perez-Gonzalez, F. (eds.) IWDW 2011. LNCS, vol. 7128, pp. 57–71. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  10. Kang, X., Huang, J., Zeng, W., Shi, Y.Q.: Non-ambiguity of blind watermarking: a revisit with analytical resolution. Science in China Series F: Information Sciences 52(2), 276–285 (2009)

    Article  MATH  Google Scholar 

  11. Ohzeki, K., Seo, Y., Gi, E.: Discontinuity of SVD Embedding Mapping Used for Watermarks. In: Meersman, R., Herrero, P., Dillon, T. (eds.) OTM 2009 Workshops. LNCS, vol. 5872, pp. 4–5. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  12. Ohzeki, K., Seo, Y., Gi, E.: Numerical Analysis of Continuity of Quasi-One-way Mapping Developed for Watermarking, IPSJ SIG. Tech. Report Vol. 2009-CSEC-45 No.5 pp.1-8 (May 2009) (in Japanese)

    Google Scholar 

  13. Moulin, P.: Comments on “Why watermarking is nonsense”. IEEE Signal Processing Magazine 20(6), 57–59 (2003)

    Article  MathSciNet  Google Scholar 

  14. Kutter, M., Voloshynovskiy, S.V., Herrigel, A.: The Watermark copy attack. In: Proc., of SPIE, Security and Watermarking of Multimedia Contents II, vol. 3971, pp. 371–930 (January 2000)

    Google Scholar 

  15. Ohzeki, K., Wei, Y.: An Obfuscation Method for a Detector of Watermarking, IPSJ SIG. Tech. Report vol. 2010-CSEC-48, No.26, pp.1–7 (March 2010) (in Japanese)

    Google Scholar 

  16. Watanabe, Y.: A Note on Numerical Computation and Speed. Advanced Computing Infrastructure Section, Research Institute for Information Technology 28(3), 207–231 (1995) (in Japanese), http://yebisu.cc.kyushu-u.ac.jp/~watanabe/RESERCH/MANUSCRIPT/KOHO/SPEED/speed.pdf

    Google Scholar 

  17. Yamamoto, Y.: Accelerating the Singular Value Decomposition of Rectangular Matrices using CUDA. Lecture Class and Workshop on GPGPU (June 24, 2009) (in Japanese), http://suchix.kek.jp/bridge/CUDA09/Docs/yamamoto_090624.ppt

  18. Kusuhara, F.: Numerical Computation Library (old), Linear Algebra in kusuhara’s wiki (in Japanese), http://www.rcs.arch.t.u-tokyo.ac.jp/kusuhara/fswiki/wiki.cgi?action=CATEGORY&category=Linear+Algebra

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ohzeki, K., Wei, Y., Hirakawa, Y., Sato, K. (2013). Consideration of the Watermark Inversion Attack and Its Invalidation Framework. In: Shi, Y.Q., Kim, HJ., Pérez-González, F. (eds) The International Workshop on Digital Forensics and Watermarking 2012. IWDW 2012. Lecture Notes in Computer Science, vol 7809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40099-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40099-5_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40098-8

  • Online ISBN: 978-3-642-40099-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics