Translator Disclaimer
Paper
4 February 2009 Joint detection-estimation games for sensitivity analysis attacks
Author Affiliations +
Proceedings Volume 7254, Media Forensics and Security; 72540F (2009) https://doi.org/10.1117/12.806111
Event: IS&T/SPIE Electronic Imaging, 2009, San Jose, California, United States
Abstract
Sensitivity analysis attacks aim at estimating a watermark from multiple observations of the detector's output. Subsequently, the attacker removes the estimated watermark from the watermarked signal. In order to measure the vulnerability of a detector against such attacks, we evaluate the fundamental performance limits for the attacker's estimation problem. The inverse of the Fisher information matrix provides a bound on the covariance matrix of the estimation error. A general strategy for the attacker is to select the distribution of auxiliary test signals that minimizes the trace of the inverse Fisher information matrix. The watermark detector must trade off two conflicting requirements: (1) reliability, and (2) security against sensitivity attacks. We explore this tradeoff and design the detection function that maximizes the trace of the attacker's inverse Fisher information matrix while simultaneously guaranteeing a bound on the error probability. Game theory is the natural framework to study this problem, and considerable insights emerge from this analysis.
© (2009) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Maha El Choubassi and Pierre Moulin "Joint detection-estimation games for sensitivity analysis attacks", Proc. SPIE 7254, Media Forensics and Security, 72540F (4 February 2009); https://doi.org/10.1117/12.806111
PROCEEDINGS
10 PAGES


SHARE
Advertisement
Advertisement
RELATED CONTENT

New sensitivity analysis attack
Proceedings of SPIE (March 21 2005)
Two different approaches for attacking BOWS
Proceedings of SPIE (February 27 2007)
Bayesian detection of acoustic muzzle blasts
Proceedings of SPIE (May 05 2009)
Watermarking for automatic quality monitoring
Proceedings of SPIE (April 29 2002)

Back to Top