Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes

Matthew Holliman, Nasir Memon

    Research output: Contribution to journalArticle

    Abstract

    In this paper, we describe a class of attacks on certain block-based oblivious watermarking schemes. We show that oblivious watermarking techniques that embed information into a host image in a block-wise independent fashion are vulnerable to a counterfeiting attack. Specifically, given a watermarked image, one can forge the watermark it contains into another image without knowing the secret key used for watermark insertion and in some cases even without explicitly knowing the watermark. We demonstrate successful implementations of this attack on a few water-marking techniques that have been proposed in the literature. We also describe a possible solution to this problem of block-wise independence that makes our attack computationally intractable.

    Original languageEnglish (US)
    Pages (from-to)432-441
    Number of pages10
    JournalIEEE Transactions on Image Processing
    Volume9
    Issue number3
    DOIs
    StatePublished - 2000

    Fingerprint

    Watermarking
    Watermark
    Attack
    Digital watermarking
    Insertion
    Demonstrate

    ASJC Scopus subject areas

    • Electrical and Electronic Engineering
    • Computer Graphics and Computer-Aided Design
    • Software
    • Theoretical Computer Science
    • Computational Theory and Mathematics
    • Computer Vision and Pattern Recognition

    Cite this

    Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. / Holliman, Matthew; Memon, Nasir.

    In: IEEE Transactions on Image Processing, Vol. 9, No. 3, 2000, p. 432-441.

    Research output: Contribution to journalArticle

    @article{f4779d85f8d34721a1651c644e91c6d7,
    title = "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes",
    abstract = "In this paper, we describe a class of attacks on certain block-based oblivious watermarking schemes. We show that oblivious watermarking techniques that embed information into a host image in a block-wise independent fashion are vulnerable to a counterfeiting attack. Specifically, given a watermarked image, one can forge the watermark it contains into another image without knowing the secret key used for watermark insertion and in some cases even without explicitly knowing the watermark. We demonstrate successful implementations of this attack on a few water-marking techniques that have been proposed in the literature. We also describe a possible solution to this problem of block-wise independence that makes our attack computationally intractable.",
    author = "Matthew Holliman and Nasir Memon",
    year = "2000",
    doi = "10.1109/83.826780",
    language = "English (US)",
    volume = "9",
    pages = "432--441",
    journal = "IEEE Transactions on Image Processing",
    issn = "1057-7149",
    publisher = "Institute of Electrical and Electronics Engineers Inc.",
    number = "3",

    }

    TY - JOUR

    T1 - Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes

    AU - Holliman, Matthew

    AU - Memon, Nasir

    PY - 2000

    Y1 - 2000

    N2 - In this paper, we describe a class of attacks on certain block-based oblivious watermarking schemes. We show that oblivious watermarking techniques that embed information into a host image in a block-wise independent fashion are vulnerable to a counterfeiting attack. Specifically, given a watermarked image, one can forge the watermark it contains into another image without knowing the secret key used for watermark insertion and in some cases even without explicitly knowing the watermark. We demonstrate successful implementations of this attack on a few water-marking techniques that have been proposed in the literature. We also describe a possible solution to this problem of block-wise independence that makes our attack computationally intractable.

    AB - In this paper, we describe a class of attacks on certain block-based oblivious watermarking schemes. We show that oblivious watermarking techniques that embed information into a host image in a block-wise independent fashion are vulnerable to a counterfeiting attack. Specifically, given a watermarked image, one can forge the watermark it contains into another image without knowing the secret key used for watermark insertion and in some cases even without explicitly knowing the watermark. We demonstrate successful implementations of this attack on a few water-marking techniques that have been proposed in the literature. We also describe a possible solution to this problem of block-wise independence that makes our attack computationally intractable.

    UR - http://www.scopus.com/inward/record.url?scp=0033872149&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=0033872149&partnerID=8YFLogxK

    U2 - 10.1109/83.826780

    DO - 10.1109/83.826780

    M3 - Article

    VL - 9

    SP - 432

    EP - 441

    JO - IEEE Transactions on Image Processing

    JF - IEEE Transactions on Image Processing

    SN - 1057-7149

    IS - 3

    ER -