Desynchronization Attacks on Watermarks Zhouyun Xu 269596.
-
date post
18-Dec-2015 -
Category
Documents
-
view
219 -
download
0
Transcript of Desynchronization Attacks on Watermarks Zhouyun Xu 269596.
![Page 1: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/1.jpg)
Desynchronization Attacks on Watermarks
Zhouyun Xu
269596
![Page 2: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/2.jpg)
Content
• Introduction
• AWGN Attack on Blind Watermarking
• Desynchronization Attack
• A Channel Model for Desynchronization Attack
• Conclusion
![Page 3: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/3.jpg)
Introduction
• Digital watermarking is the art of communicating information
• We consider digital watermarking as a communication problem, where the watermark communication channel is characterized by possible attacks against the embedded watermark
![Page 4: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/4.jpg)
Blind Watermark
• In many applications, the original document cannot be used during watermark reception, which is denoted as blind watermark reception or more generally blind watermarking.
• We only talk about blind watermark here
![Page 5: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/5.jpg)
AWGN attack
• It is the addition of white Gaussian noise (AWGN)
• The analysis of extended attack scenarios can often be based on the analysis of the AWGN attack
• It can be applied easily so that each watermarking scheme should show good robustness at least against it
![Page 6: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/6.jpg)
Synchronization?
• The watermark receiver can look for the watermark information exactly at the same position where it has been embedded
• In real-world scenarios, this assumption does not hold necessarily
• An attacker may intentionally modifies the watermarked document in order to desynchronize the watermark receiver
![Page 7: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/7.jpg)
AWGN Attack on Blind Watermarking
• Digital watermarking a communications problem which can be described as communication channel
![Page 8: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/8.jpg)
• The encoder derives from the watermark message m and the host signal x an appropriate watermark signal w which is added to the host signal to produce the watermarked signal s
• w must be chosen such that the distortion between x and s is negligible
![Page 9: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/9.jpg)
• The watermarked signal s might be processed,which gives a signal r
• Such processing potentially impairs watermark communication and thus is denoted as an attack against the embedded digital watermark.
• Finally, the receiver must be able to decode the watermark message from the received (attacked) signal r
![Page 10: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/10.jpg)
• Both, encoding and decoding, depend on a key sequence k, which ensures that only authorized parties can embed, decode, and modify the embedded watermark message m (will be talked about later)
• The structure is displayed as follow:
![Page 11: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/11.jpg)
![Page 12: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/12.jpg)
• Watermark signal w which can be chosen independently from the host signal x
• spread-spectrum (SS) watermarking:
a Gaussian watermark signal with:
2~ (0, )wN
![Page 13: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/13.jpg)
• For blind SS watermark re-ception, the unknown host signal x is considered as unavoidable interference.
• Watermark capacity of SS watermarking for Gaussian host signals and AWGN attacks is
![Page 14: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/14.jpg)
In 1999, Costa showed theoretically that for
a Gaussian host signal of power
a watermark signal of power
and AWGN of power
The maximum rate of reliable
communication capacity is
2 220.5log (1 / )w vC
![Page 15: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/15.jpg)
• The result is surprising since it shows that the host signal x need not be considered as interference at the decoder although the decoder does not know x.
• But: It depends on a random codebook which must be available at the encoder and the decoder.
• This codebook may be so large that neither storing it nor searching it is not practical
![Page 16: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/16.jpg)
Scalar Costa Scheme
• For SCS watermarking, the watermark message m is encoded into a sequence of watermark letters d, where
in case of binary SCS. Each of the watermark letters is embedded into the corresponding host elements x[n]. The embedding rule for the nth element is given by:
![Page 17: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/17.jpg)
![Page 18: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/18.jpg)
• Here, is denotes scalar uniform quantization with step size The key k is a pseudo-random sequence with This embedding scheme depends on two parameters: the quantizer step size and the scale factor
[ ] (0,1]K n
![Page 19: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/19.jpg)
• Watermark decoding from the received signal r is based on the pre-processed received signal y. The extraction rule for the nth element is
![Page 20: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/20.jpg)
• The basic properties of binary SCS watermarking can be demonstrated by the probability density function (PDF) of the transmitted signal s and the PDF of the extracted signal y
• Watermark-to-Noise power Ratio (WNR)
![Page 21: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/21.jpg)
• One period of the PDF is of the transmitted and the received signal for binary SCS . The filled areas represent the probability of detection errors assuming d = 0 was sent. The dotted line in the lower plot depicts the PDF when detecting with a wrong key k.
![Page 22: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/22.jpg)
![Page 23: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/23.jpg)
Desynchronization Attacks
• Early desynchronization attacks consisted of rather simple global affine transformation, which now can be recovered easily.
• Random bending attack:
small local geometric distortions
![Page 24: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/24.jpg)
• StirMark applied to a regular grid
![Page 25: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/25.jpg)
• For this attack, a smooth transformation of the sampling grid is applied which desynchronizes a simple watermark detector. Thus, preprocessing prior to standard watermark detection is required to enable watermark detection
• We assume that resynchronization has been performed on the received data so that only a jitter in the sampling grid remains as the effective distortion
![Page 26: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/26.jpg)
A Channel Model forDesynchronization Attacks
• s[n] = x[n] + w[n] denote the discrete watermarked signal . This signal corresponds to the critically sampled continuous signal s(t) which is bandlimited to where T denotes the width of one sampling interval.
• Then, denotes the resampled signal, where an offset in the sampling grid has been introduced. Assuming ideal interpolation, dfdf can be computed from with:
![Page 27: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/27.jpg)
![Page 28: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/28.jpg)
![Page 29: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/29.jpg)
• where Further signal distortions due to attack operations are described by an additive noise source v[n] with power , so that the received attacked signal is given by
![Page 30: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/30.jpg)
• Next, the nth received signal sample r[n] is decomposed into a component derived from the nth watermarked sample s[n] and additional contributions from samples with which gives
![Page 31: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/31.jpg)
![Page 32: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/32.jpg)
• corresponds to the information bearing signal component, and describes Inter-Symbol-Interference (ISI).
• We assume that ISI is unavoidable interference for SCS watermark detection. Further, we assume in the following that the watermarked signal is white and Gaussian distributed with a power of
![Page 33: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/33.jpg)
The power of the attenuated watermark
after the warping operation :
• In turn, the resulting noise power
contains now the ISI term from and the AWGN v[n]:
![Page 34: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/34.jpg)
![Page 35: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/35.jpg)
• Another interesting value is the Attack to Interference Power Ratio (AIR), which is defined as
![Page 36: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/36.jpg)
![Page 37: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/37.jpg)
Watermark Capacity for Imperfectly
Synchronized Reception• SCS watermarking has been introduces as
a powerful blind watermarking technology. Significant gains over state-of-the-art SS watermarking are predicted due to the host-signal independence of blind SCS watermarking
![Page 38: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/38.jpg)
• The described channel model for imperfectly synchronized watermark detection shows that the strength of ISI interference is strongly dependent on the host signal, in particular on the DWR
![Page 39: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/39.jpg)
• In SCS, the side-information about the host signal x at the encoder is exploited in a quite simple way. That is, the watermark sample w[n] is chosen such that interference from x[n] during blind watermark detection vanishes or is negligible at least. The infuence of samples
x[n + v], for v ≠ 0, which contribute strongest to the total ISI, is not considered during SCS water-mark embedding
![Page 40: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/40.jpg)
• the performance of SCS in case of desynchronization attacks is no longer host signal independent. As soon as there is a desynchronization attack and this attack cannot be reversed perfectly, SCS suffers from host signal interference similar to SS watermarking
![Page 41: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/41.jpg)
• We assume that the ISI has a Gaussian distribution, which is reasonable for a white and Gaussian host signal x. Then, the capacity of SCS watermarking after AWGN and desynchronization attacks can be obtained from the the capacity of SCS watermarking facing a simple AWGN attacks using the effective watermark-to-noise ratio
as derived before
![Page 42: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/42.jpg)
![Page 43: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/43.jpg)
Conclusions and Future Research
• SCS suffers from inter-symbol-interference (ISI) in case of imperfectly synchronized watermark detection. This is especially true for large document-to-watermark power ratios (DWRs), where ISI dominates other attack distortions. Thus, the propertyof SCS being host signal independent is no more true under desynchronization attacks.
![Page 44: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/44.jpg)
• For realistics DWRs, a synchronization error up to 10 % of the sampling interval is acceptable. For such accurate resynchronization,SCS watermarking performs for weak to medium-strong attacks still significantly better than SS watermarking.
• Very exact resynchronization plays a major role for this watermarking method to keep up a reasonable watermark capacity
![Page 45: Desynchronization Attacks on Watermarks Zhouyun Xu 269596.](https://reader035.fdocuments.us/reader035/viewer/2022062421/56649d225503460f949f877f/html5/thumbnails/45.jpg)
Thank you!