Skip to Main content Skip to Navigation
Conference papers

Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes

Abstract : Benchmarking watermarking systems now goes beyond only evaluating the ability of the embedded watermark to with- stand common signal primitives such as filtering, resampling, lossy compression, D/A-A/D conversions, etc. Evaluation procedures have to consider how much information leaks from a watermarking system since such knowledge could prove most helpful to design very powerful attacks. This paper further refines an attack on dirty paper watermarking schemes which relies on security weaknesses i.e. information leakage. In particular, additional constraints are introduced to be able to handle ‘complex' trellises. Moreover, the ef- ficiency of this attack has been evaluated for different trel- lis configurations. Quite counter-intuitively, increasing the number of states in the trellis seems to enhance both the robustness and the security of the system.
Complete list of metadatas

Cited literature [14 references]  Display  Hide  Download
Contributor : Patrick Bas <>
Submitted on : Friday, September 26, 2008 - 11:13:42 AM
Last modification on : Wednesday, October 7, 2020 - 11:40:13 AM
Long-term archiving on: : Monday, October 8, 2012 - 1:35:35 PM


Files produced by the author(s)


  • HAL Id : hal-00325086, version 1



Patrick Bas, Gwenaël Doërr. Evaluation of an Optimal Watermark Tampering Attack Against Dirty Paper Trellis Schemes. ACM Multimedia and Security Workshop 2008, Sep 2008, -, United Kingdom. pp.227--232. ⟨hal-00325086⟩



Record views


Files downloads