Blind Newton sensitivity attack

Blind Newton sensitivity attack

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IEE Proceedings - Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Until now, the sensitivity attack was considered as a serious threat to the robustness and security of spread-spectrum-based schemes, since it provides a practical method of removing watermarks with minimum attacking distortion. Nevertheless, it had not been used to remove the watermark from other watermarking algorithms, such as those which use side-information. Furthermore, the sensitivity attack has never been used to obtain falsely watermarked contents, also known as forgeries. In this paper a new version of the sensitivity attack based on a general formulation is proposed; this method does not require any knowledge about the detection function nor any other system parameter, but just the binary output of the detector, being suitable for attacking most known watermarking methods. The new approach is validated with experiments.


    1. 1)
      • Cox, I.J., Linnartz, J.P.M.G.: `Public watermarks and resistance to tampering', IEEE Int. Conf. Image Processing ICIP'97, October 1997, Santa Barbara, CA, USA, 3, p. 3–6.
    2. 2)
      • Cox, I.J., Killian, J., Leighton, T., Shamoon, T.: `Secure spread spectrum watermarking for multimedia', IEEE Trans. Image Process., December 1997, 6, p. 1673–1687.
    3. 3)
      • Linnartz, J.P.M.G., van Dijk, M.: `Analysis of the sensitivity attack against electronic watermarks in images', 2nd Int. Workshop on Information Hiding, IH'98, April 1998, Portland, OR, USA, p. 258–272, (LNCS 1525).
    4. 4)
      • Kalker, T., Linnartz, J.P., van Dijk, M.: `Watermark estimation through detector analysis', IEEE Int. Conf. Image Processing, ICIP'98, October 1998, Chicago, IL, USA, p. 425–429.
    5. 5)
      • Mansour, M.F., Tewfik, A.H.: `LMS-based attack on watermark public detectors', IEEE Int. Conf. Image Processing, ICIP'02, September 2002, Rochester, NY, USA, 3, p. 649–652.
    6. 6)
      • T. Furon , I. Venturini , P. Duhamel , E.J. Delp , P.W. Wong . (2001) An unified approach of asymmetric watermarking schemes, Security and Watermarking of Multimedia Contents III.
    7. 7)
      • Furon, T., Macq, B., Hurley, N., Silvestre, G.: `JANIS: just another N-order side-informed watermarking scheme', IEEE Int. Conf. Image Processing, ICIP'02, September 2002, Rochester, NY, USA, 3, p. 153–156.
    8. 8)
      • Venturini, I.: `Oracle attacks and covert channels', Fourth Int. Workshop on Digital Watermarking, September 2005, Siena, Italy, Springer, (LNCS, 3710).
    9. 9)
      • M. El Choubassi , P. Moulin , E. J. Delp , P. W. Wong . (2005) New sensitivity analysis attack, Security, Steganography and Watermarking of Multimedia Contents VII.
    10. 10)
      • G.P. McCormick . (1983) , Nonlinear programming.
    11. 11)
      • J. Nocedal , S.J. Wright . (1999) , Numerical optimization.
    12. 12)
      • I.J. Cox , M.L. Miller , J.A. Bloom . (2002) Digital watermarking, Multimedia Information and Systems Series.
    13. 13)
      • J.R. Hernández , M. Amado , F. Pérez-González . DCT-domain watermarking techniques for still images: detector performance analysis and a new structure. IEEE Trans. Image Process. , 1 , 55 - 68
    14. 14)
      • Eggers, J.J., Girod, B.: `Blind watermarking applied to image authentication', Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), May 2001, 3, p. 1977–1980.
    15. 15)
      • Liu, T., Moulin, P.: `Error exponents for one-bit watermarking', Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), 6–8 April 2003, 3, p. 65–68.
    16. 16)
      • L. Pérez-Freire , P. Comesaña , F. Pérez-González , E. J. Delp , P.W. Wong . (2005) Detection in quantization-based watermarking: performance and security issues, Security, Steganography, and Watermarking of Multimedia Contents VII.
    17. 17)
      • M.L. Miller , G.J. Doërr , I.J. Cox . Applying informed coding and embedding to design a robust high-capacity watermark. IEEE Trans. Image Process. , 6 , 792 - 807
    18. 18)
      • Adelsbach, A., Sadeghi, A-R: `Zero-knowledge watermark detection and proof of ownership', 4th Int. Workshop on Information Hiding, IH'01, April 2001, Pittsburgh, PA, USA, Springer Verlag, p. 273–288, (LNCS 2137).

Related content

This is a required field
Please enter a valid email address