Countermeasure against estimation-based attacks of spread-spectrum watermarks
First Claim
1. A computer storage medium having computer-executable instructions that, when executed by a computer, performs a method facilitating a watermark estimation-based attack countermeasure, the method comprising:
- facilitating the watermark estimation-based attack countermeasure by;
obtaining a digital good, which comprises digital content embodied on one or more computer-readable media, wherein the digital good is not just a watermark;
analyzing the digital good to determine that such digital good was subjected to a watermark estimation-based attack, in response to determining that such digital good was subjected to a watermark estimation-based attack performing a countermeasure comprising;
determining an estimated attack-amplification value α
likely employed by a watermark estimation-based attack on the digital good;
producing an approximation of the digital good before it was subjected to the watermark estimation-based attack, whereby the produced approximation of the digital good facilitates a countermeasure to a watermark estimation-based attack, wherein the producing comprises;
identifying portions of a probability distribution function (PDF) of the digital good that remain unchanged after the watermark estimation-based attack on the digital good;
shifting the identified portions of the PDF of the digital good by the estimated attack-amplification value α
; and
determining the remainder of the PDF between the portions.
2 Assignments
0 Petitions
Accused Products
Abstract
Described herein is a technology for facilitating watermark detection. Spread-spectrum watermarking is a commonly employed technique for hiding data in digital goods (e.g., multimedia signals). Such watermarks may be potentially vulnerable to so-called “watermark estimation-based attacks.” At least one implementation, described herein, is an advancement over the traditional spread-spectrum watermark detector. At least one implementation, described herein, greatly discourages an estimation-based attack by an adversary. At least one implementation, described herein, determines whether a digital good has likely been subjected to an estimation-based attack and, at least, approximately reverses such attack. The scope of the present invention is pointed out in the appending claims.
66 Citations
11 Claims
-
1. A computer storage medium having computer-executable instructions that, when executed by a computer, performs a method facilitating a watermark estimation-based attack countermeasure, the method comprising:
facilitating the watermark estimation-based attack countermeasure by; obtaining a digital good, which comprises digital content embodied on one or more computer-readable media, wherein the digital good is not just a watermark; analyzing the digital good to determine that such digital good was subjected to a watermark estimation-based attack, in response to determining that such digital good was subjected to a watermark estimation-based attack performing a countermeasure comprising; determining an estimated attack-amplification value α
likely employed by a watermark estimation-based attack on the digital good;producing an approximation of the digital good before it was subjected to the watermark estimation-based attack, whereby the produced approximation of the digital good facilitates a countermeasure to a watermark estimation-based attack, wherein the producing comprises; identifying portions of a probability distribution function (PDF) of the digital good that remain unchanged after the watermark estimation-based attack on the digital good; shifting the identified portions of the PDF of the digital good by the estimated attack-amplification value α
; anddetermining the remainder of the PDF between the portions. - View Dependent Claims (2)
-
3. A computer storage medium having computer-executable instructions that, when executed by a computer, performs a method facilitating a watermark estimation-based attack countermeasure, the method comprising:
-
obtaining a digital good, which had been subjected to a watermark estimation-based attack, wherein the digital good comprises digital content embodied on one or more computer-readable media, wherein the digital good is not just a watermark; determining an estimated attack-amplification value α
;producing an approximation of the digital good before it was subjected to the watermark estimation-based attack, whereby the produced approximation of the digital good facilitates a countermeasure to a watermark estimation-based attack, wherein the producing comprises; identifying portions of a probability distribution function (PDF) of the digital good that remain unchanged after the watermark estimation-based attack on the digital good; shifting the identified portions of the PDF of the digital good by the estimated attack-amplification value α
;determining remainder of the PDF between the portions. - View Dependent Claims (4, 5)
-
-
6. A method facilitating a watermark estimation-based attack countermeasure, the method comprising:
-
obtaining a digital good, which had been subjected to a watermark estimation-based attack, wherein the digital good comprises digital content embodied on one or more computer-readable media, wherein the digital good is not just a watermark; determining an estimated attack-amplification value α
;producing an approximation of the digital good before it was subjected to the watermark estimation-based attack, whereby the produced approximation of the digital good facilitates a countermeasure to a watermark estimation-based attack, wherein the producing comprises; identifying portions of a probability distribution function (PDF) of the digital good that remain unchanged after the watermark estimation-based attack on the digital good; shifting the identified portions of the PDF of the digital good by the estimated attack-amplification value α
;determining remainder of the PDF between the portions. - View Dependent Claims (7, 8)
-
-
9. A watermark detection system comprising:
-
a memory comprising a set of computer program instructions; and a processor coupled to the memory, the processor being configured to execute the computer program instructions facilitating a watermark estimation-based attack countermeasure, such instructions that when executed by a processor perform a method comprising; obtaining a digital good, which had been subjected to a watermark estimation-based attack, wherein the digital good comprises digital content embodied on one or more computer-readable media, wherein the digital good is not just a watermark; determining an estimated attack-amplification value α
;producing an approximation of the digital good before it was subjected to the watermark estimation-based attack, whereby the produced approximation of the digital good facilitates a countermeasure to a watermark estimation-based attack, wherein the producing comprises; identifying portions of a probability distribution function (PDF) of the digital good that remain unchanged after the watermark estimation-based attack on the digital good; shifting the identified portions of the PDF of the digital good by the estimated attack-amplification value α
;determining remainder of the PDF between the portions. - View Dependent Claims (10, 11)
-
Specification