Share Email Print

Proceedings Paper

Audio watermarking forensics: detecting malicious re-embedding
Author(s): Sascha Zmudzinski; Martin Steinebach; Stefan Katzenbeisser; Ulrich Rührmair
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Digital watermarking has become a widely used security technology in the domain of digital rights management and copyright protection as well as in other applications. In this work, we show recent results regarding a particular security attack: Embedding a new message in a previously watermarked cover using the same key as the original message. This re-embedding can be the consequence of the absence of truly asymmetric watermarking solutions, especially if the watermark is to be detected in public. In public detection scenarios, every detector needs the same key the embedder used to watermark the cover. With knowledge of the embedding algorithm, everybody who is able to detect the message can also maliciously embed a new message with the same key over the old one. This scenario is relevant in the case that an attacker intends to counterfeit a copyright notice, transaction ID or to change an embedded authentication code. This work presents experimental results on mechanisms for identifying such multiple embeddings in a spreadspectrum patchwork audio watermarking approach. We demonstrate that under certain circumstances such multiple embedding can be detected by watermarking-forensics.

Paper Details

Date Published: 27 January 2010
PDF: 10 pages
Proc. SPIE 7541, Media Forensics and Security II, 75410G (27 January 2010); doi: 10.1117/12.838881
Show Author Affiliations
Sascha Zmudzinski, Fraunhofer-Institut für Sichere Informations-Technologie (Germany)
Martin Steinebach, Fraunhofer-Institut für Sichere Informations-Technologie (Germany)
Stefan Katzenbeisser, Technische Univ. Darmstadt (Germany)
Ulrich Rührmair, Technische Univ. München (Germany)

Published in SPIE Proceedings Vol. 7541:
Media Forensics and Security II
Nasir D. Memon; Jana Dittmann; Adnan M. Alattar; Edward J. Delp III, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?