A new approach to countering ambiguity attacks

Husrev Taha Sencar*, Qiming Li, Nasir Memon

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Watermarking based ownership dispute resolution schemes are vulnerable to a simple but effective class of attacks, called ambiguity attacks, which cast doubt on the reliability of resulting decision by exploiting the high false-positive rate of the watermarking scheme. To mitigate such attacks, we propose a new scheme that embeds multiple watermarks, as opposed to embedding a single watermark, while constraining the embedding distortion, and detects a randomly selected subset of them during an ownership proof. The crux of the scheme lies in both watermark generation, which deploys a family of one-way functions, and selective detection, which injects uncertainty to detection process. The reduction in false-positive probability is analyzed and compared to single watermark embedding for the additive watermarking technique through numerical solutions. Moreover, we examine the exact security level that can be achieved by our scheme with different combinations of parameters. We adopt a previous security proof of non-invertible watermarking schemes with modified notion of security that is more realistic in practice, which allows us to derive the achievable security with typical parameters.

Original languageEnglish
Title of host publicationMM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
Pages205-214
Number of pages10
DOIs
Publication statusPublished - 2007
Externally publishedYes
EventMM and Sec'07 - 9th Multimedia and Security Workshop 2007 - Dallas, TX, United States
Duration: 20 Sept 200721 Sept 2007

Publication series

NameMM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007

Conference

ConferenceMM and Sec'07 - 9th Multimedia and Security Workshop 2007
Country/TerritoryUnited States
CityDallas, TX
Period20/09/0721/09/07

Keywords

  • Ambiguity attack
  • Security
  • Watermarking

Fingerprint

Dive into the research topics of 'A new approach to countering ambiguity attacks'. Together they form a unique fingerprint.

Cite this