TY - JOUR
T1 - Watermark-only security attack on DM-QIM watermarking
T2 - vulnerability to guided key guessing
AU - Matam, B.R.
AU - Lowe, David
PY - 2010/4
Y1 - 2010/4
N2 - This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.
AB - This paper addresses the security of a specific class of common watermarking methods based on Dither modulation-quantisation index modulation (DM-QIM) and focusing on watermark-only attacks (WOA). The vulnerabilities of and probable attacks on lattice structure based watermark embedding methods have been presented in the literature. DM-QIM is one of the best known lattice structure based watermarking techniques. In this paper, the authors discuss a watermark-only attack scenario (the attacker has access to a single watermarked content only). In the literature it is an assumption that DM-QIM methods are secure to WOA. However, the authors show that the DM-QIM based embedding method is vulnerable against a guided key guessing attack by exploiting subtle statistical regularities in the feature space embeddings for time series and images. Using a distribution-free algorithm, this paper presents an analysis of the attack and numerical results for multiple examples of image and time series data.
UR - http://www.scopus.com/inward/record.url?scp=78651541802&partnerID=8YFLogxK
UR - http://www.igi-global.com/article/watermark-only-security-attack-qim/43555
U2 - 10.4018/jdcf.2010040105
DO - 10.4018/jdcf.2010040105
M3 - Article
SN - 1941-6210
VL - 2
SP - 64
EP - 87
JO - International Journal of Digital Crime and Forensics
JF - International Journal of Digital Crime and Forensics
IS - 2
ER -