Adaptive Collusion Attack to a Block Oriented Watermarking Scheme
In this paper, we propose an adaptive collusion attack to a block oriented watermarking scheme [1]. In this attack, traitors conspire to selectively manipulate watermarked blocks to remove the watermark information. To this end, the traitors compare the watermarked blocks generated from the same ori...
Saved in:
Main Authors: | , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2003
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1080 https://ink.library.smu.edu.sg/context/sis_research/article/2079/viewcontent/Wu_Deng2003_AdaptiveCollusionAttackToABlock_pv.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2079 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-20792022-02-18T03:01:25Z Adaptive Collusion Attack to a Block Oriented Watermarking Scheme WU, Yongdong DENG, Robert H. In this paper, we propose an adaptive collusion attack to a block oriented watermarking scheme [1]. In this attack, traitors conspire to selectively manipulate watermarked blocks to remove the watermark information. To this end, the traitors compare the watermarked blocks generated from the same original block. If two watermarked block are not equal, they average these two blocks to generate a pirated block. Then, replace the watermarked blocks with the pirated blocks so as to build a pirated image. The pirated image has no watermark but has much higher quality than watermarked images. We also give a theoretical analysis on the probability of successful traitor tracing. Both theoretical and experimental results demonstrate that our attack is very effective when four or more traitors are involved in the collusion attack. In the cases of less than four traitors, we show how to integrate our collusion attack with an adaptive random attack to improve the qualities of pirated images as well as to defeat the tracer. 2003-10-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1080 info:doi/10.1007/978-3-540-39927-8_22 https://ink.library.smu.edu.sg/context/sis_research/article/2079/viewcontent/Wu_Deng2003_AdaptiveCollusionAttackToABlock_pv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Watermark Scheme Image Block Digital Watermark Collusion Attack Watermark Information Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Watermark Scheme Image Block Digital Watermark Collusion Attack Watermark Information Information Security |
spellingShingle |
Watermark Scheme Image Block Digital Watermark Collusion Attack Watermark Information Information Security WU, Yongdong DENG, Robert H. Adaptive Collusion Attack to a Block Oriented Watermarking Scheme |
description |
In this paper, we propose an adaptive collusion attack to a block oriented watermarking scheme [1]. In this attack, traitors conspire to selectively manipulate watermarked blocks to remove the watermark information. To this end, the traitors compare the watermarked blocks generated from the same original block. If two watermarked block are not equal, they average these two blocks to generate a pirated block. Then, replace the watermarked blocks with the pirated blocks so as to build a pirated image. The pirated image has no watermark but has much higher quality than watermarked images. We also give a theoretical analysis on the probability of successful traitor tracing. Both theoretical and experimental results demonstrate that our attack is very effective when four or more traitors are involved in the collusion attack. In the cases of less than four traitors, we show how to integrate our collusion attack with an adaptive random attack to improve the qualities of pirated images as well as to defeat the tracer. |
format |
text |
author |
WU, Yongdong DENG, Robert H. |
author_facet |
WU, Yongdong DENG, Robert H. |
author_sort |
WU, Yongdong |
title |
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme |
title_short |
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme |
title_full |
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme |
title_fullStr |
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme |
title_full_unstemmed |
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme |
title_sort |
adaptive collusion attack to a block oriented watermarking scheme |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2003 |
url |
https://ink.library.smu.edu.sg/sis_research/1080 https://ink.library.smu.edu.sg/context/sis_research/article/2079/viewcontent/Wu_Deng2003_AdaptiveCollusionAttackToABlock_pv.pdf |
_version_ |
1770570848960249856 |