A new approach to countering ambiguity attacks

Husrev Taha Sencar, Qiming Li, Nasir Memon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Watermarking based ownership dispute resolution schemes are vulnerable to a simple but effective class of attacks, called ambiguity attacks, which cast doubt on the reliability of resulting decision by exploiting the high false-positive rate of the watermarking scheme. To mitigate such attacks, we propose a new scheme that embeds multiple watermarks, as opposed to embedding a single watermark, while constraining the embedding distortion, and detects a randomly selected subset of them during an ownership proof. The crux of the scheme lies in both watermark generation, which deploys a family of one-way functions, and selective detection, which injects uncertainty to detection process. The reduction in false-positive probability is analyzed and compared to single watermark embedding for the additive watermarking technique through numerical solutions. Moreover, we examine the exact security level that can be achieved by our scheme with different combinations of parameters. We adopt a previous security proof of non-invertible watermarking schemes with modified notion of security that is more realistic in practice, which allows us to derive the achievable security with typical parameters.

Original languageEnglish (US)
Title of host publicationMM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
Pages205-214
Number of pages10
DOIs
StatePublished - 2007
EventMM and Sec'07 - 9th Multimedia and Security Workshop 2007 - Dallas, TX, United States
Duration: Sep 20 2007Sep 21 2007

Other

OtherMM and Sec'07 - 9th Multimedia and Security Workshop 2007
CountryUnited States
CityDallas, TX
Period9/20/079/21/07

Fingerprint

Watermarking

Keywords

  • Ambiguity attack
  • Security
  • Watermarking

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Cite this

Sencar, H. T., Li, Q., & Memon, N. (2007). A new approach to countering ambiguity attacks. In MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007 (pp. 205-214) https://doi.org/10.1145/1288869.1288898

A new approach to countering ambiguity attacks. / Sencar, Husrev Taha; Li, Qiming; Memon, Nasir.

MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007. 2007. p. 205-214.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sencar, HT, Li, Q & Memon, N 2007, A new approach to countering ambiguity attacks. in MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007. pp. 205-214, MM and Sec'07 - 9th Multimedia and Security Workshop 2007, Dallas, TX, United States, 9/20/07. https://doi.org/10.1145/1288869.1288898
Sencar HT, Li Q, Memon N. A new approach to countering ambiguity attacks. In MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007. 2007. p. 205-214 https://doi.org/10.1145/1288869.1288898
Sencar, Husrev Taha ; Li, Qiming ; Memon, Nasir. / A new approach to countering ambiguity attacks. MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007. 2007. pp. 205-214
@inproceedings{2c2238189d3f4138bd150dc810aa076f,
title = "A new approach to countering ambiguity attacks",
abstract = "Watermarking based ownership dispute resolution schemes are vulnerable to a simple but effective class of attacks, called ambiguity attacks, which cast doubt on the reliability of resulting decision by exploiting the high false-positive rate of the watermarking scheme. To mitigate such attacks, we propose a new scheme that embeds multiple watermarks, as opposed to embedding a single watermark, while constraining the embedding distortion, and detects a randomly selected subset of them during an ownership proof. The crux of the scheme lies in both watermark generation, which deploys a family of one-way functions, and selective detection, which injects uncertainty to detection process. The reduction in false-positive probability is analyzed and compared to single watermark embedding for the additive watermarking technique through numerical solutions. Moreover, we examine the exact security level that can be achieved by our scheme with different combinations of parameters. We adopt a previous security proof of non-invertible watermarking schemes with modified notion of security that is more realistic in practice, which allows us to derive the achievable security with typical parameters.",
keywords = "Ambiguity attack, Security, Watermarking",
author = "Sencar, {Husrev Taha} and Qiming Li and Nasir Memon",
year = "2007",
doi = "10.1145/1288869.1288898",
language = "English (US)",
isbn = "9781595938572",
pages = "205--214",
booktitle = "MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007",

}

TY - GEN

T1 - A new approach to countering ambiguity attacks

AU - Sencar, Husrev Taha

AU - Li, Qiming

AU - Memon, Nasir

PY - 2007

Y1 - 2007

N2 - Watermarking based ownership dispute resolution schemes are vulnerable to a simple but effective class of attacks, called ambiguity attacks, which cast doubt on the reliability of resulting decision by exploiting the high false-positive rate of the watermarking scheme. To mitigate such attacks, we propose a new scheme that embeds multiple watermarks, as opposed to embedding a single watermark, while constraining the embedding distortion, and detects a randomly selected subset of them during an ownership proof. The crux of the scheme lies in both watermark generation, which deploys a family of one-way functions, and selective detection, which injects uncertainty to detection process. The reduction in false-positive probability is analyzed and compared to single watermark embedding for the additive watermarking technique through numerical solutions. Moreover, we examine the exact security level that can be achieved by our scheme with different combinations of parameters. We adopt a previous security proof of non-invertible watermarking schemes with modified notion of security that is more realistic in practice, which allows us to derive the achievable security with typical parameters.

AB - Watermarking based ownership dispute resolution schemes are vulnerable to a simple but effective class of attacks, called ambiguity attacks, which cast doubt on the reliability of resulting decision by exploiting the high false-positive rate of the watermarking scheme. To mitigate such attacks, we propose a new scheme that embeds multiple watermarks, as opposed to embedding a single watermark, while constraining the embedding distortion, and detects a randomly selected subset of them during an ownership proof. The crux of the scheme lies in both watermark generation, which deploys a family of one-way functions, and selective detection, which injects uncertainty to detection process. The reduction in false-positive probability is analyzed and compared to single watermark embedding for the additive watermarking technique through numerical solutions. Moreover, we examine the exact security level that can be achieved by our scheme with different combinations of parameters. We adopt a previous security proof of non-invertible watermarking schemes with modified notion of security that is more realistic in practice, which allows us to derive the achievable security with typical parameters.

KW - Ambiguity attack

KW - Security

KW - Watermarking

UR - http://www.scopus.com/inward/record.url?scp=38849206158&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=38849206158&partnerID=8YFLogxK

U2 - 10.1145/1288869.1288898

DO - 10.1145/1288869.1288898

M3 - Conference contribution

AN - SCOPUS:38849206158

SN - 9781595938572

SP - 205

EP - 214

BT - MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007

ER -