Combatting ambiguity attacks via selective detection of embedded watermarks

Husrev Taha Sencar, Nasir Memon

Research output: Contribution to journalArticle

Abstract

This paper focuses on a problem that is common to most watermarking-based ownership dispute resolutions and ownership assertion systems. Such systems are vulnerable to a simple but effective class of attacks that exploit the high false-positive rate of the watermarking techniques to cast doubt on the reliability of a resulting decision. To mitigate this vulnerability, we propose embedding multiple watermarks, as opposed to embedding a single watermark, and detecting a randomly selected subset of them while constraining the embedding distortion. The crux of the scheme lies in both watermark generation, which deploys a family of one-way functions and selective detection, which injects uncertainty into the detection process. The potential of this approach in reducing the false-positive probability is analyzed under various operating conditions and compared to single watermark embedding. The multiple watermark embedding and selective detection technique is incorporated analytically into the additive watermarking technique and results obtained through numerical solutions are presented to illustrate its effectiveness.

Original languageEnglish (US)
Pages (from-to)664-682
Number of pages19
JournalIEEE Transactions on Information Forensics and Security
Volume2
Issue number4
DOIs
StatePublished - Dec 2007

Fingerprint

Watermarking

Keywords

  • Ambiguity attacks
  • Ownership assertion
  • Ownership dispute resolution
  • Watermarking

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality

Cite this

Combatting ambiguity attacks via selective detection of embedded watermarks. / Sencar, Husrev Taha; Memon, Nasir.

In: IEEE Transactions on Information Forensics and Security, Vol. 2, No. 4, 12.2007, p. 664-682.

Research output: Contribution to journalArticle

@article{4f98d0667574436fa5b902f6683c4ff0,
title = "Combatting ambiguity attacks via selective detection of embedded watermarks",
abstract = "This paper focuses on a problem that is common to most watermarking-based ownership dispute resolutions and ownership assertion systems. Such systems are vulnerable to a simple but effective class of attacks that exploit the high false-positive rate of the watermarking techniques to cast doubt on the reliability of a resulting decision. To mitigate this vulnerability, we propose embedding multiple watermarks, as opposed to embedding a single watermark, and detecting a randomly selected subset of them while constraining the embedding distortion. The crux of the scheme lies in both watermark generation, which deploys a family of one-way functions and selective detection, which injects uncertainty into the detection process. The potential of this approach in reducing the false-positive probability is analyzed under various operating conditions and compared to single watermark embedding. The multiple watermark embedding and selective detection technique is incorporated analytically into the additive watermarking technique and results obtained through numerical solutions are presented to illustrate its effectiveness.",
keywords = "Ambiguity attacks, Ownership assertion, Ownership dispute resolution, Watermarking",
author = "Sencar, {Husrev Taha} and Nasir Memon",
year = "2007",
month = "12",
doi = "10.1109/TIFS.2007.908211",
language = "English (US)",
volume = "2",
pages = "664--682",
journal = "IEEE Transactions on Information Forensics and Security",
issn = "1556-6013",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "4",

}

TY - JOUR

T1 - Combatting ambiguity attacks via selective detection of embedded watermarks

AU - Sencar, Husrev Taha

AU - Memon, Nasir

PY - 2007/12

Y1 - 2007/12

N2 - This paper focuses on a problem that is common to most watermarking-based ownership dispute resolutions and ownership assertion systems. Such systems are vulnerable to a simple but effective class of attacks that exploit the high false-positive rate of the watermarking techniques to cast doubt on the reliability of a resulting decision. To mitigate this vulnerability, we propose embedding multiple watermarks, as opposed to embedding a single watermark, and detecting a randomly selected subset of them while constraining the embedding distortion. The crux of the scheme lies in both watermark generation, which deploys a family of one-way functions and selective detection, which injects uncertainty into the detection process. The potential of this approach in reducing the false-positive probability is analyzed under various operating conditions and compared to single watermark embedding. The multiple watermark embedding and selective detection technique is incorporated analytically into the additive watermarking technique and results obtained through numerical solutions are presented to illustrate its effectiveness.

AB - This paper focuses on a problem that is common to most watermarking-based ownership dispute resolutions and ownership assertion systems. Such systems are vulnerable to a simple but effective class of attacks that exploit the high false-positive rate of the watermarking techniques to cast doubt on the reliability of a resulting decision. To mitigate this vulnerability, we propose embedding multiple watermarks, as opposed to embedding a single watermark, and detecting a randomly selected subset of them while constraining the embedding distortion. The crux of the scheme lies in both watermark generation, which deploys a family of one-way functions and selective detection, which injects uncertainty into the detection process. The potential of this approach in reducing the false-positive probability is analyzed under various operating conditions and compared to single watermark embedding. The multiple watermark embedding and selective detection technique is incorporated analytically into the additive watermarking technique and results obtained through numerical solutions are presented to illustrate its effectiveness.

KW - Ambiguity attacks

KW - Ownership assertion

KW - Ownership dispute resolution

KW - Watermarking

UR - http://www.scopus.com/inward/record.url?scp=36349007114&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=36349007114&partnerID=8YFLogxK

U2 - 10.1109/TIFS.2007.908211

DO - 10.1109/TIFS.2007.908211

M3 - Article

AN - SCOPUS:36349007114

VL - 2

SP - 664

EP - 682

JO - IEEE Transactions on Information Forensics and Security

JF - IEEE Transactions on Information Forensics and Security

SN - 1556-6013

IS - 4

ER -