Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes - C2S Accéder directement au contenu
Communication Dans Un Congrès Année : 2008

Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes

Résumé

Benchmarking watermarking systems now goes beyond only evaluating the ability of the embedded watermark to with- stand common signal primitives such as filtering, resampling, lossy compression, D/A-A/D conversions, etc. Evaluation procedures have to consider how much information leaks from a watermarking system since such knowledge could prove most helpful to design very powerful attacks. This paper further refines an attack on dirty paper watermarking schemes which relies on security weaknesses i.e. information leakage. In particular, additional constraints are introduced to be able to handle ‘complex' trellises. Moreover, the ef- ficiency of this attack has been evaluated for different trel- lis configurations. Quite counter-intuitively, increasing the number of states in the trellis seems to enhance both the robustness and the security of the system.
Fichier principal
Vignette du fichier
mmsec31s-bas.pdf (532.32 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-00325086 , version 1 (26-09-2008)

Identifiants

  • HAL Id : hal-00325086 , version 1

Citer

Patrick Bas, Gwenaël Doërr. Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes. ACM Multimedia and Security Workshop 2008, Sep 2008, -, United Kingdom. pp.227--232. ⟨hal-00325086⟩
119 Consultations
114 Téléchargements

Partager

Gmail Facebook X LinkedIn More