We revisit the well-known watermarking detection problem, also known as one-bit watermarking, in the presence of an oracle attack. In the absence of an adversary, the design of the detector generally relies on probabilistic formulations (e. g., Neyman-Pearson's lemma) or on ad-hoc solutions. When there is an adversary trying to minimize the probability of correct detection, game-theoretic approaches are possible. However, they usually assume that the attacker cannot learn the secret parameters used in detection. This is no longer the case when the adversary launches an oracle-based attack, which turns out to be extremely effective. In this paper, we discuss how the detector can learn whether it is being subject to such an attack, and take proper measures. We present two approaches based on different attacker models. The first model is very general and makes minimum assumptions on attacker's beaver. The second model is more specific since it assumes that the oracle attack follows a weel-defined path. In all cases, a few observations are sufficient to the watermark detector to understand whether an oracle attack is on going.

Barni, M., COMESANA ALFARO, P., Pérez González, F., Tondi, B. (2014). Are you threatening me? Towards smart detectors in watermarking. In MEDIA WATERMARKING, SECURITY, AND FORENSICS 2014 (pp.UNSP 902806). Bellingham : SPIE-INT SOC OPTICAL ENGINEERING [10.1117/12.2036415].

Are you threatening me? Towards smart detectors in watermarking

BARNI, MAURO;COMESANA ALFARO, PEDRO;TONDI, BENEDETTA
2014-01-01

Abstract

We revisit the well-known watermarking detection problem, also known as one-bit watermarking, in the presence of an oracle attack. In the absence of an adversary, the design of the detector generally relies on probabilistic formulations (e. g., Neyman-Pearson's lemma) or on ad-hoc solutions. When there is an adversary trying to minimize the probability of correct detection, game-theoretic approaches are possible. However, they usually assume that the attacker cannot learn the secret parameters used in detection. This is no longer the case when the adversary launches an oracle-based attack, which turns out to be extremely effective. In this paper, we discuss how the detector can learn whether it is being subject to such an attack, and take proper measures. We present two approaches based on different attacker models. The first model is very general and makes minimum assumptions on attacker's beaver. The second model is more specific since it assumes that the oracle attack follows a weel-defined path. In all cases, a few observations are sufficient to the watermark detector to understand whether an oracle attack is on going.
2014
978-0-8194-9945-5
Barni, M., COMESANA ALFARO, P., Pérez González, F., Tondi, B. (2014). Are you threatening me? Towards smart detectors in watermarking. In MEDIA WATERMARKING, SECURITY, AND FORENSICS 2014 (pp.UNSP 902806). Bellingham : SPIE-INT SOC OPTICAL ENGINEERING [10.1117/12.2036415].
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11365/981790
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo