Share Email Print

Proceedings Paper

Better security levels for broken arrows
Author(s): Fuchun Xie; Teddy Furon; Caroline Fontaine
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

This paper deals with the security of the robust zero-bit watermarking technique "Broken Arrows" (BA),1 which was invented and tested for the international challenge BOWS-2.2 The results of the first episode of the challenge showed that BA is very robust and we proposed last year an enhancement called "Averaging Wavelet Coefficients" (AWC),3 which further strengthens the robustness against the worst attack disclosed during this BOWS-2's first episode.4 However, in the second and third episodes of the challenge, during which the pirates could observe plenty of pictures watermarked with the same secret key, security flaws have been revealed and discussed.5 Here we propose counterattacks to these security flaws, investigating BA and its variant AWC. We propose two counterattack directions: to use the embedding technique AWC instead of BA, and to regulate the system parameters to lighten the watermarking embedding footprint. We also discuss these directions in the context of traitor tracing.6 Experimental results show that following these recommendations is sufficient to counter these attacks.

Paper Details

Date Published: 27 January 2010
PDF: 10 pages
Proc. SPIE 7541, Media Forensics and Security II, 75410H (27 January 2010); doi: 10.1117/12.838895
Show Author Affiliations
Fuchun Xie, INRIA Rennes Research Ctr. (France)
Teddy Furon, Thomson Security Labs. (France)
Caroline Fontaine, Lab.-STICC, CNRS (France)
Télécom Bretagne (France)

Published in SPIE Proceedings Vol. 7541:
Media Forensics and Security II
Nasir D. Memon; Jana Dittmann; Adnan M. Alattar; Edward J. Delp III, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?