A new approach to countering ambiguity attacks

Husrev Taha Sencar, Qiming Li, Nasir Memon

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Watermarking based ownership dispute resolution schemes are vulnerable to a simple but effective class of attacks, called ambiguity attacks, which cast doubt on the reliability of resulting decision by exploiting the high false-positive rate of the watermarking scheme. To mitigate such attacks, we propose a new scheme that embeds multiple watermarks, as opposed to embedding a single watermark, while constraining the embedding distortion, and detects a randomly selected subset of them during an ownership proof. The crux of the scheme lies in both watermark generation, which deploys a family of one-way functions, and selective detection, which injects uncertainty to detection process. The reduction in false-positive probability is analyzed and compared to single watermark embedding for the additive watermarking technique through numerical solutions. Moreover, we examine the exact security level that can be achieved by our scheme with different combinations of parameters. We adopt a previous security proof of non-invertible watermarking schemes with modified notion of security that is more realistic in practice, which allows us to derive the achievable security with typical parameters.

    Original languageEnglish (US)
    Title of host publicationMM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
    Pages205-214
    Number of pages10
    DOIs
    StatePublished - 2007
    EventMM and Sec'07 - 9th Multimedia and Security Workshop 2007 - Dallas, TX, United States
    Duration: Sep 20 2007Sep 21 2007

    Other

    OtherMM and Sec'07 - 9th Multimedia and Security Workshop 2007
    CountryUnited States
    CityDallas, TX
    Period9/20/079/21/07

    Fingerprint

    Watermarking

    Keywords

    • Ambiguity attack
    • Security
    • Watermarking

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Software

    Cite this

    Sencar, H. T., Li, Q., & Memon, N. (2007). A new approach to countering ambiguity attacks. In MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007 (pp. 205-214) https://doi.org/10.1145/1288869.1288898

    A new approach to countering ambiguity attacks. / Sencar, Husrev Taha; Li, Qiming; Memon, Nasir.

    MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007. 2007. p. 205-214.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Sencar, HT, Li, Q & Memon, N 2007, A new approach to countering ambiguity attacks. in MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007. pp. 205-214, MM and Sec'07 - 9th Multimedia and Security Workshop 2007, Dallas, TX, United States, 9/20/07. https://doi.org/10.1145/1288869.1288898
    Sencar HT, Li Q, Memon N. A new approach to countering ambiguity attacks. In MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007. 2007. p. 205-214 https://doi.org/10.1145/1288869.1288898
    Sencar, Husrev Taha ; Li, Qiming ; Memon, Nasir. / A new approach to countering ambiguity attacks. MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007. 2007. pp. 205-214
    @inproceedings{2c2238189d3f4138bd150dc810aa076f,
    title = "A new approach to countering ambiguity attacks",
    abstract = "Watermarking based ownership dispute resolution schemes are vulnerable to a simple but effective class of attacks, called ambiguity attacks, which cast doubt on the reliability of resulting decision by exploiting the high false-positive rate of the watermarking scheme. To mitigate such attacks, we propose a new scheme that embeds multiple watermarks, as opposed to embedding a single watermark, while constraining the embedding distortion, and detects a randomly selected subset of them during an ownership proof. The crux of the scheme lies in both watermark generation, which deploys a family of one-way functions, and selective detection, which injects uncertainty to detection process. The reduction in false-positive probability is analyzed and compared to single watermark embedding for the additive watermarking technique through numerical solutions. Moreover, we examine the exact security level that can be achieved by our scheme with different combinations of parameters. We adopt a previous security proof of non-invertible watermarking schemes with modified notion of security that is more realistic in practice, which allows us to derive the achievable security with typical parameters.",
    keywords = "Ambiguity attack, Security, Watermarking",
    author = "Sencar, {Husrev Taha} and Qiming Li and Nasir Memon",
    year = "2007",
    doi = "10.1145/1288869.1288898",
    language = "English (US)",
    isbn = "9781595938572",
    pages = "205--214",
    booktitle = "MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007",

    }

    TY - GEN

    T1 - A new approach to countering ambiguity attacks

    AU - Sencar, Husrev Taha

    AU - Li, Qiming

    AU - Memon, Nasir

    PY - 2007

    Y1 - 2007

    N2 - Watermarking based ownership dispute resolution schemes are vulnerable to a simple but effective class of attacks, called ambiguity attacks, which cast doubt on the reliability of resulting decision by exploiting the high false-positive rate of the watermarking scheme. To mitigate such attacks, we propose a new scheme that embeds multiple watermarks, as opposed to embedding a single watermark, while constraining the embedding distortion, and detects a randomly selected subset of them during an ownership proof. The crux of the scheme lies in both watermark generation, which deploys a family of one-way functions, and selective detection, which injects uncertainty to detection process. The reduction in false-positive probability is analyzed and compared to single watermark embedding for the additive watermarking technique through numerical solutions. Moreover, we examine the exact security level that can be achieved by our scheme with different combinations of parameters. We adopt a previous security proof of non-invertible watermarking schemes with modified notion of security that is more realistic in practice, which allows us to derive the achievable security with typical parameters.

    AB - Watermarking based ownership dispute resolution schemes are vulnerable to a simple but effective class of attacks, called ambiguity attacks, which cast doubt on the reliability of resulting decision by exploiting the high false-positive rate of the watermarking scheme. To mitigate such attacks, we propose a new scheme that embeds multiple watermarks, as opposed to embedding a single watermark, while constraining the embedding distortion, and detects a randomly selected subset of them during an ownership proof. The crux of the scheme lies in both watermark generation, which deploys a family of one-way functions, and selective detection, which injects uncertainty to detection process. The reduction in false-positive probability is analyzed and compared to single watermark embedding for the additive watermarking technique through numerical solutions. Moreover, we examine the exact security level that can be achieved by our scheme with different combinations of parameters. We adopt a previous security proof of non-invertible watermarking schemes with modified notion of security that is more realistic in practice, which allows us to derive the achievable security with typical parameters.

    KW - Ambiguity attack

    KW - Security

    KW - Watermarking

    UR - http://www.scopus.com/inward/record.url?scp=38849206158&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=38849206158&partnerID=8YFLogxK

    U2 - 10.1145/1288869.1288898

    DO - 10.1145/1288869.1288898

    M3 - Conference contribution

    SN - 9781595938572

    SP - 205

    EP - 214

    BT - MM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007

    ER -