A new approach to countering ambiguity attacks

Husrev Taha Sencar, Qiming Li, Nasir Memon

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Watermarking based ownership dispute resolution schemes are vulnerable to a simple but effective class of attacks, called ambiguity attacks, which cast doubt on the reliability of resulting decision by exploiting the high false-positive rate of the watermarking scheme. To mitigate such attacks, we propose a new scheme that embeds multiple watermarks, as opposed to embedding a single watermark, while constraining the embedding distortion, and detects a randomly selected subset of them during an ownership proof. The crux of the scheme lies in both watermark generation, which deploys a family of one-way functions, and selective detection, which injects uncertainty to detection process. The reduction in false-positive probability is analyzed and compared to single watermark embedding for the additive watermarking technique through numerical solutions. Moreover, we examine the exact security level that can be achieved by our scheme with different combinations of parameters. We adopt a previous security proof of non-invertible watermarking schemes with modified notion of security that is more realistic in practice, which allows us to derive the achievable security with typical parameters.

Original languageEnglish (US)
Title of host publicationMM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007
Pages205-214
Number of pages10
DOIs
StatePublished - 2007
EventMM and Sec'07 - 9th Multimedia and Security Workshop 2007 - Dallas, TX, United States
Duration: Sep 20 2007Sep 21 2007

Publication series

NameMM and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007

Other

OtherMM and Sec'07 - 9th Multimedia and Security Workshop 2007
Country/TerritoryUnited States
CityDallas, TX
Period9/20/079/21/07

Keywords

  • Ambiguity attack
  • Security
  • Watermarking

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Fingerprint

Dive into the research topics of 'A new approach to countering ambiguity attacks'. Together they form a unique fingerprint.

Cite this