Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE...

17
Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003

Transcript of Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE...

Page 1: Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

Blind Pattern Matching Attack on Watermark

SystemsD. Kirovski and F. A. P. Petitcolas

IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003

Page 2: Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

Outline

• Introduction• The blind pattern matching attack

(BPM)– Notations– Attacking steps– Attacking parameter determination

• BPM attacks for spread-spectrum watermarking and quantization watermarking of audio signals

• Conclusions

Page 3: Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

To Attack Digital Watermarking

• Main types of attacks– To remove the watermark

• Estimating the unmarked cover signal– Median filters

• Collusion attacks for fingerprinting

– To prevent the detector from detecting the watermark• Geometric distortions

Page 4: Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

The BPM Attack

• An attack aims to reduce the correlation of a watermarked signal with its watermark by replacing blocks of samples of the marked signal with perceptually similar blocks that are either not marked or marked with a different watermark

Page 5: Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

Attacking Strategy

1. Partition the content into overlapping low-granularity signal blocks

2. Identify subsets of perceptually similar blocks

3. Randomly permute their locations in the signal

Page 6: Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

Search Space

• If the number of blocks that have perceptually similar counterparts within the media clip is small, the adversary can seek replacement blocks in an external multimedia library

• Even without external replacement, watermark detector faces a task of exponential complexity to reverse the permutation

Page 7: Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

Block Sizes

• The adversary needs to reduce the granularity of integral blocks of data such that no block contains enough information from which a watermark can be identified individually– Blocks considered for BPM must at

least one order of magnitude smaller than watermark length• Audio: 128-1024 coefficients• Video: 64x64 pixels

Page 8: Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

Notations

• Host signal

• Watermark

• Marked signal

),0(~, xiN NxRx

The BPM attack is not limited to certain signal model. The Gaussian assumption facilitates further analysis.

xNRw ,

e.g. in spread-spectrum watermarking,

Nw }{

wxx ~

Page 9: Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

Attacking Concerns

• Signal partitioning• Similarity function

– Determining the lower bound of similarity

• Pattern matching• Block substitution

Page 10: Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

Signal Partitioning

• The watermarked signal is partitioned into n overlapping blocks.

• Each block Bp represents a sequence of m samples starting at

• Why overlapping?– Consecutive blocks may lack

perceptually similar characteristics

)],1/()[( mNn :the overlap ratio

)(~ pBx

Page 11: Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

Similarity Function

• The quadratic Euclidean distance between blocks are used:

1

0

2)(~)(~ ][),(

m

iBxiBxiqP qp

yyBB

Page 12: Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

Pattern Matching

• Perceptual similarities between individual blocks are identified by a symmetric similarity bit-matrix S:

• The upper bound preserves fidelity, the lower bound is required since a block of exceptional similarity will not affect watermark detection

,0

,1,qpS

if22 ),( mBBm qp

otherwise

22 , :parameters that denote the minimal and maximal average similarity

Page 13: Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

Determining the Lower Bound

(1/2) • In the SS watermark detector

– The watermark w is detected in the signal z by matched filtering

• If z has been marked with w

• Otherwise

• Detection threshold

wzwzC T),(

2),( mwzC

0),( wzC

2/2 m

Page 14: Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

Determining the Lower Bound

(2/2) • Now assume the vector x+w is

similar to and replaced by y+v

2222

2222

222

222

)),(22))((

))())((

)()(

)()(

mwvCEmxyEm

mwvExyEm

mwvxym

mwxvym

0)2

()(2

1

),(

),(

222

mxyE

wvCE

wvyCE

2

if

Page 15: Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

Block Substitution

1. Copy2. Marked all blocks as unvisited3. Find unvisited Block Bp

4. Let Gp be a set of indices, s.t.

5. Let Lp be a random permutation of elements of Gp

6. Reorder blocks of with Gp according to Lp

7. Marks all blocks in Gp as visited

8. Go to Step 3.

xx ~'~

1, , qpp SGq

'~x

Page 16: Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

Experimental Results

• Test BPM attacks for audio contents watermarked with spread-spectrum and quantization index modulation schemes– For the SS scheme, within a 30s audio

clip, the attack creates approximate 4 to 5 dB noise and brings the SS correlation detector to half the expected value without attack

– Similar adversary effects can be obtained for the QIM detector

Page 17: Blind Pattern Matching Attack on Watermark Systems D. Kirovski and F. A. P. Petitcolas IEEE Transactions on Signal Processing, VOL. 51, NO. 4, April 2003.

Remedies against the BPM Attack

• Identifying rare parts of the content and marked these parts only– Reducing the practical capacity and

increasing the embedding complexity

• Longer watermarks and increased detector sensitivity– Very-long watermark sequence and

lower robustness against other attacks