Countermeasures for collusion attacks exploiting host signal redundancy

  • Authors:
  • Gwenaël Doërr;Jean-Luc Dugelay

  • Affiliations:
  • Multimedia Communications Department, Eurécom Institute, Sophia-Antipolis, France;Multimedia Communications Department, Eurécom Institute, Sophia-Antipolis, France

  • Venue:
  • IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Multimedia digital data is highly redundant: successive video frames are very similar in a movie clip, most songs contain some repetitive patterns, etc. This property can consequently be exploited to successively replace each part of the signal with a similar one taken from another location in the same signal or with a combination of similar parts. Such an approach is all the more pertinent when video content is considered since such signals exhibit both temporal and spatial self-similarities. To counter such attacking strategies, it is necessary to ensure that embedded watermarks are coherent with the redundancy of the host content. To this end, both motion-compensated watermarking and self-similarities inheritance will be surveyed.