Practical security analysis of dirty paper trellis watermarking

  • Authors:
  • Patrick Bas;Gwenaël Doërr

  • Affiliations:
  • CIS, Helsinki University of Technology, HUT Finland and Gipsa-lab CNRS INPG, St. Martin d'Hères, France;University College London, Martlesham, United Kingdom

  • Venue:
  • IH'07 Proceedings of the 9th international conference on Information hiding
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper analyses the security of dirty paper trellis (DPT) watermarking schemes which use both informed coding and informed embedding. After recalling the principles of message embedding with DPT watermarking, the secret parameters of the scheme are highlighted. The security weaknesses of DPT watermarking are then presented: in the watermarked contents only attack (WOA) setup, the watermarked dataset exhibits clusters corresponding to the different patterns attached to the arcs of the trellis. The K-means clustering algorithm is used to estimate these patterns and a co-occurrence analysis is performed to retrieve the connectivity of the trellis. Experimental results demonstrate that it is possible to accurately estimate the trellis configuration, which enables to perform attacks much more efficient than simple additive white Gaussian noise (AWGN).