throbber
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 16, NO. 4, MAY 1998
`
`587
`
`Some General Methods for
`Tampering with Watermarks
`
`Ingemar J. Cox, Senior Member, IEEE, and Jean-Paul M. G. Linnartz, Member, IEEE
`
`Abstract—Watermarks allow embedded signals to be extracted
`from audio and video content for a variety of purposes. One
`application is for copyright control, where it is envisaged that
`digital video recorders will not permit the recording of content
`that is watermarked as “never copy.” In such a scenario, it
`is important that the watermark survive both normal signal
`transformations and attempts to remove the watermark so that
`an illegal copy can be made. In this paper, we discuss to what
`extent a watermark can be resistant to tampering and describe
`a variety of possible attacks.
`
`I. INTRODUCTION
`
`an average user to circumvent the copy protection system, by
`for example, removing the watermark.
`This paper discusses the susceptibility of watermarking
`algorithms to tampering. We assume that the reader is aware
`of typical watermark methods (e.g., [2]–[7], [13]). A compre-
`hensive review is included in [9] Section II describes what
`is meant by an “unrestricted-key” watermark and Section III
`outlines how a public watermark will be used for copy control
`of DVD disks. In Section IV, we introduce some notation.
`In Section V, we describe how signal processing affects the
`detectability of the watermark. In Section VI, we then describe
`a series of attacks that may be used to remove a watermark.
`
`THE DIGITAL distribution of copyrighted content is at-
`
`tractive to content owners. However, the possibility of
`making an unlimited number of perfect digital copies is a
`serious concern. While it is acknowledged that professional
`piracy is unlikely to be prevented by technological means
`alone, it is hoped that the illegal casual copying that occurs
`in the home can be prevented by a combination of encryption
`and watermarking. For example, copyrighted video content
`intended for the digital versatile disk (DVD) will be scrambled
`before being placed on a disk, much like premium channels
`for cable TV. However, after descrambling, the content is
`unprotected, which is why a watermark or embedded signal
`will also be placed in the content. Digital video players
`will look for watermarks in copyrighted material and prevent
`playback if a “never copy” watermark is detected in material
`whose source is known to be a recordable disk. Similarly,
`digital video recorders will not record material if a “never
`copy” watermark is detected.
`The above example is an oversimplification of the copyright
`protection system being designed for DVD. Nevertheless, it
`serves to illustrate an application in which millions of digital
`video players must be capable of reading signals embedded
`in the video content. In such a scenario,
`it
`is imperative
`that the watermark survive common video signal transfor-
`mations, especially MPEG-2 compression and recompression
`and analog-to-digital and digital-to-analog conversions, since
`copies of content originally stored in compressed form on a
`DVD disc might subsequently be copied onto an analog VHS
`tape before being redigitized and recompressed by a writable
`DVD recorder. Just as importantly, it should not be trivial for
`
`Manuscript received August, 1997; revised October, 1997. This paper was
`presented in part at the IEEE International Conference on Image Processing
`in 1997 and appeared in part in the CD-ROM version of the same conference.
`I. J. Cox is with NEC Research Institute, Princeton, NJ 08540 USA.
`J.-P. M. G. Linnartz is with Natuurkundig Laboratorium, WY8, Philips
`Research, 5656 AA Eindhoven, The Netherlands.
`Publisher Item Identifier S 0733-8716(98)01448-6.
`
`II. RESTRICTED AND UNRESTRICTED-KEY WATERMARKING
`The requirements for watermarking differ between applica-
`tions. An important distinguishing characteristic is the level
`of restriction placed on the ability to read a watermark. For
`example, in many cases, it is desirable to embed information
`in audio, image, or video content such that this information
`is readable by many receivers. For instance, in an applica-
`tion such as transferring copyright ownership information by
`watermarking news photographs, any and all receiving users
`should be capable of reading the embedded information.
`In the past [8], we have described such systems as “public”
`watermarks, drawing analogy with public key cryptography.
`However, this is misleading. All currently known watermark-
`ing algorithms fall
`into the category of secret key cryp-
`tographic algorithms and their functionality depends of the
`restrictions placed on the watermark key. Thus, we prefer to
`describe watermarks in which the key is available to a very
`large number of detectors as “unrestricted-key” watermarks.
`To the best of our knowledge, no equivalent to public key
`encryption is currently available for watermarking.
`The key itself may simply be a pseudorandom number
`sequence that is embedded in all images or might be some
`parameters of the original unwatermarked image, such that a
`different key is used for each different image.
`If security is an utmost concern, a content owner may
`desire to restrict access to information about the key, i.e.,
`the watermark is only readable from a limited number of
`trusted receivers that share that secret. Or, a content owner
`may wish to ensure that the embedded information is most
`resistant to tampering. In these circumstances, one can use a
`restricted-key embedding method. Knowledge of this secret
`key is needed to embed the watermark and also to detect the
`watermark. It is common for such a secret key to include
`information about the original unwatermarked image. This can
`Sony Exhibit 1046
`0733–8716/98$10.00 © 1998 IEEE
`Sony v. MZ Audio
`
`

`

`588
`
`IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 16, NO. 4, MAY 1998
`
`make detection significantly more robust and consequently, the
`watermark becomes much more difficult for a pirate to remove.
`An hypothetical example of restricted-key watermarking is in
`the recording industry, that might choose to use watermarks
`to automatically monitor and log the music that is broadcast.
`This facilitates the transfer of airplay royalties to the music
`industry. In a scenario where monitoring receivers are located
`“in the field,” the watermark embedding system as well as any
`and all receiving monitors can be owned and operated by the
`royalty collection agency.
`A similar scenario can be used for a service in which images
`are watermarked and search robots scan the Internet to find
`illegally posted copies of these images. In this scenario it is not
`a fundamental problem that the watermark detector contains
`sensitive secret data, i.e., a detection key, that would reveal
`how the watermark can be erased. Potential attackers do not,
`in principle, have access to a watermark detector. However, a
`security threat occurs if a detector may accidentally fall into
`the hands of a malicious user.
`Different applications require different levels of robustness
`and security or tamper resistance. For example,
`the radio
`station application only requires that the watermark be de-
`tectable after the signal distortions caused by the normal radio
`transmission process, i.e., it does not need to be tamper resis-
`tant. After all, even if the radio station were able to remove
`these marks, they cannot do it often without being detected
`by random checks, because these transmissions are public.
`However, for the DVD “never copy” application, the pirated
`content may be kept private, so no such outside auditing is
`possible. Hence a much greater security and resistance to
`tampering is desirable.
`Copy protection applications require that a watermark can
`be read by anyone, even by potential copyright pirates, but
`nonetheless only the sender should be able to embed and
`erase the watermark. An unrestricted-key watermarking is thus
`preferred, though other solutions are possible. For example, a
`restricted-key algorithm placed in a tamper-resistant box can
`be used. However, this approach has weaknesses and other
`disadvantages. An attacker may be able to reverse engineer
`the tamper-resistant box. For the consumer electronics and
`computer industry, the logistics of the manufacturing process
`are more complicated and less flexible if secret data has to
`be handled during design, prototyping, testing, debugging,
`and quality control. Some of the attacks to be described in
`Section VI exploit the very problem that algorithms which are
`inherently “secret key” in nature, are used in an environment
`where public detection properties are desired, i.e., access to
`the key is almost completely unrestricted.
`
`III. USAGE OF UNRESTRICTED-KEY WATERMARKS
`FOR DVD VIDEO COPY PROTECTION
`For consumers, the image quality of digital video disks
`provides a significant improvement over the quality of existing
`home video equipment, such as VHS recorders. However, for
`content providers, there is a greater risk of illegal copying,
`since each DVD copy is a perfect digital reproduction. The
`first aim of copy protection schemes is to prevent illegal copies
`
`from being made. Failing that, the aim is to reduce the value
`of illegal copies, either by reducing their quality (hopefully to
`the point of being unwatchable) or by restricting their use.
`Copy protection in DVD is supported by three means. First,
`the video material is encrypted. Thus, a digital copy of the
`encrypted disk will not play on compliant DVD players. This
`is because the disk key will not match. Clearly, encryption is
`very useful, but the key is less than 40 bits, in order to avoid
`export control restrictions. Another possible weakness is that it
`is important that the playback system cannot be circumvented.
`This is easier to achieve in a consumer electronic device that is
`a closed black box, but potentially significantly more difficult
`for personal computers.
`If the video material remains encrypted, then there is no
`need for watermarking. However,
`there are several ways
`that a copyrighted and encrypted video might be copied as
`an unencrypted, in-the-clear video, thereby losing the copy
`protection afforded through scrambling. Ignoring the issue of
`compliance, which is dealt with in Section VI-D, in-the-clear
`copies of encrypted material are most likely to occur through
`subsequent recording of the descrambled video. The in-the-
`clear video signal is available at a variety of sources. In the
`analog domain it is present in the NTSC signal and/or the RGB
`signal. And in the very near future, uncompressed digital video
`is likely to be available over the IEEE 1394 “Firewire” serial
`interface.
`To prevent analog copying, DVD players are equipped with
`an analog protection system (APS). This is a proprietary
`technology that modifies the generated NTSC signal such
`that most VHS video recorders cannot record a high-quality
`copy despite the fact that the same signal does not affect the
`TV display. Unfortunately, this system does not protect RGB
`signals, which are common to PC’s, from analog recording
`and is therefore easily circumventable. Thus, some percentage
`of copyrighted video material will find its way into the analog
`domain.
`The most likely source of a high-quality digital copy is
`through the digitization of this analog copy. Neither encryption
`nor the APS signaling prevent playback or recording of this
`illegal copy. The third line of defense is a watermark that is
`inserted into the video sequence. This watermark is intended to
`survive MPEG-2 compression and digital-to-analog-to-digital
`conversions, i.e., if the video fidelity remains high, then the
`watermark should remain detectable.
`A watermark in the video data can be used to prevent illegal
`copying by telling a compliant device not to copy it. It can
`also reduce the value of illegal copies by preventing them from
`being played on compliant devices. This means that consumers
`will have a choice between: 1) compliant devices, that can
`play legal, store-bought disks that were encrypted, but cannot
`play pirated disks and 2) noncompliant devices, that can play
`pirated material, but cannot play encrypted disks.
`For the DVD application, the watermark inserted into a
`piece of video must describe the restrictions on that video’s
`usage. Toward this end, the Copy Protection Technical Work-
`ing Group (CPTWG) of the DVD consortium has proposed
`that the watermark encode the following four bits shown in
`Table I.
`
`

`

`COX AND LINNARTZ: SOME GENERAL METHODS FOR TAMPERING WITH WATERMARKS
`
`589
`
`TABLE I
`
`The copy generation management system (CGMS) is in-
`tended to support one generation of copying, i.e., in some
`circumstances, users will be able to make a digital copy, but
`the system should prevent copies of this copy (or subsequent
`copies) being made. There is no limit to the number of one
`generation copies that can be made. In order to implement
`the “copy once” functionality of CGMS, it will probably be
`necessary to have one or more additional bits in the watermark
`that can be easily changed by consumer DVD devices.
`
`A. Technical Requirements
`The requirements placed on watermarking algorithms for the
`above application differ from those for other applications that
`are currently in the market, such as identification of ownership.
`The application of watermarking for copy protection requires a
`low bit rate and allows the use of many frames for watermark
`detection. However, since watermark detectors must be built
`into millions of low-cost, consumer devices, and since these
`detectors must work at video rates, there is a very strong
`requirement that the detector be extremely simple and cheap.
`Furthermore, since the DVD standard employs MPEG coding,
`the watermarking method must work well with MPEG. These
`last two requirements are challenging design specifications.
`The requirements for the APS bits are:
`1) detectable in the compressed and baseband video;
`2) detector should be very inexpensive both in terms of
`gate count (hardware) or MIPS (software);
`3) no visible artifacts, i.e., very high image fidelity;
`4) tamper resistant, i.e., it should not be easily circum-
`vented or removed;
`5) watermark should survive color representation conver-
`sion from YUV to RGB;
`6) data rate of 2 bits per frame;
`7) permanent—the APS bits do not need to be altered.
`The requirements for the playback control and copy gener-
`ation system are:
`1) detectable in the baseband and/or compressed video;
`2) 2–5 of APS requirements;
`3) data rate low (e.g., 2 bits per 100 frames);
`4) field encodable for generation control—multiple water-
`marks using possibly different methods though detection
`circuitry should preferable be the same;
`5) ability to increment (for generation control).
`
`Both systems should also survive:
`1) compression;
`2) decompression;
`3) digital-to-Analog;
`4) analog-to-Digital;
`5) standards conversion, e.g., analog video recorder (VHS),
`the European broadcast standard PAL, the French broad-
`cast standard SECAM;
`6) time dilation—changes in frames rate.
`
`IV. FORMULATION OF A MODEL
`the
`Mathematically, given an image
`and a watermark
`watermarked image,
`such
`is formed by
`denotes the perceptual
`where
`that
`difference, and
`refers to just noticeable difference, i.e.,
`the watermarked image is constrained to be visually identical
`(or very similar) to the original unwatermarked image.
`In theory, the function may be arbitrary, but in practice
`can be
`robustness requirements pose constraints on how
`chosen. One requirement
`is that watermarking has to be
`robust to random noise addition. Therefore many watermark
`designers opt for a scheme in which image will result in
`approximately the same watermark as a slightly altered image
`with
`In such cases
`.
`For an unrestricted-key watermark, detection of the water-
`is typically achieved by correlating the watermark
`mark,
`with some function,
`of the watermarked image.
`Example: In its basic form, in one half of the pixels the
`luminance is increased by one unit step while the luminance
`is kept constant [3] or decreased by one unit step [2] in the
`other half. Detection by summing luminances in the first subset
`and subtracting the sum of luminances in the latter subset
`is a special case of a correlator. One can describe this as
`with
`and where
`The
`detector computes
`where
`denotes the scalar product
`of two vectors.
`is chosen at random, then the distribution of
`If
`will tend to be quite small, as the random terms will tend
`to cancel themselves out, leaving only a residual variance.
`However, in computing
`all of the terms are positive,
`and will thus add up. For this reason, the product
`will be close to
`In particular, for
`sufficiently large images, it will be large, even if the magnitude
`of
`is much larger than the magnitude of
`It turns out
`that the probability of making an incorrect detection can be
`expressed as the complementary error function of the square
`root of the ratio
`over the variance in pixel luminance
`values. This result is very similar to expressions commonly
`encountered in digital transmission over noisy radio channels.
`A derivation is outside the scope of this paper, so we refer
`the interested reader to [12] for a detailed evaluation of the
`statistical behavior of
`and
`
`V. SIGNAL TRANSFORMATIONS
`The above specification may not seem difficult since it only
`requires the embedding of 4 bits of information in a data
`stream and if detection is only expected every 10 s say, then
`
`

`

`590
`
`IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 16, NO. 4, MAY 1998
`
`30
`480
`the total video data is approximately 720
`10. This is over 100 Mbytes prior to MPEG compression.
`However, the constraints of 1) maintaining image fidelity, and
`2) surviving common signal transformations, can be severe. In
`particular, many signal transformations cannot be modeled by
`a simple linear additive noise process. Instead, such processes
`are highly spatially correlated and may interact with the
`watermark in complex ways.
`transformations
`There are a number of common signal
`that a watermark should survive, e.g., affine transformations,
`compression/recompression, and noise. In some circumstances,
`it may be possible to design a watermark that is completely
`invariant to a particular transformation. For example, this is
`usually the case for translational motions. However, scale
`changes are often much more difficult to design for and it
`may be the case that a watermark algorithm is only robust to
`small perturbations in scale. In this case, a series of attacks
`may be mounted by identifying the limits of a particular wa-
`termarking scheme and subsequently finding a transformation
`that is outside of these limits yet maintains adequate image
`fidelity.
`
`A. Attacks by Affine Transformations
`Shifts over a few pixels can cause watermarking detectors to
`miss the presence of watermark. The problem can be illustrated
`by our example watermarking scheme. Suppose one shifts
`by one pixel, obtaining
`Let
`and
`denote the similarly
`shifted versions of
`and
`Then
`will tend to cancel
`As before, the random
`terms in
`themselves out. However, the
`terms will also cancel
`value was chosen independently.
`themselves out, if each
`Hence,
`will have small magnitude and the watermark
`will not be detected.
`Typical analog VHS recorders cause shifting over a small
`portion of a line, but enough to cause a shift of several pixels or
`even a few DCT blocks. Recorder time jitter and tape wear are
`a significant cause of stretching of a image. Even if the effects
`are not disturbing to a viewer, it may completely change the
`alignment of the watermark with respect to pixels and DCT
`block boundaries.
`There are a number of defenses against such attacks. Ideally,
`one would like to reverse the affine transformations. Given an
`original, a reasonable approximation to the distortion can be
`computed. With unrestricted-key watermarks, and in particular
`the “do not copy” application, no original is available. A
`secondary signal, i.e., a registration pattern, may be inserted
`into the image whose entire purpose is to assist in reversing
`the transformation. However, one can base attacks on this
`secondary signal, removing or altering it in order to block
`detection of the watermark. The mark components can be
`positioned at key visual features of the image, e.g., in patches
`whose average luminosity is at a local maximum. Finally,
`one can insert the mark into features that are transformation
`invariant. For example, the magnitudes of Fourier coefficients
`are translation invariant.
`In some applications, it may be assumed that the extent of
`the affine transformation is minor.
`
`B. Attacks by Noise Addition
`A common misunderstanding is that a watermark of small
`amplitude can be removed by adding random noise of a similar
`amplitude. On the contrary, correlation detectors appear very
`robust against addition of a random noise term For instance
`if
`one can describe the attacked image as
`The detector computes
`The product
`If the watermark was designed
`largely exceeding the statistical spreading in
`with
`it will mostly also largely exceed the statistical spreading in
`In practice, noise mostly is not a serious threat unless
`(in the frequency components of relevance) the noise is large
`or if the noise is correlated with the
`compared to image
`watermark.
`
`C. Attacks by Digital Compression: Future Digital Recorders
`Digital recorders may not always make a bit exact copy.
`Digital recorders will, at least initially, not contain sophis-
`ticated signal processing facilities. For recording of MPEG
`streams onto media with limited storage capacity, the recorder
`may have to reduce the bit rate of the content.
`This will particularly be the case for high-quality high-rate
`source video such as high-definition broadcasts. A commonly
`adopted method is to more coarsely quantize the high (spatial)
`frequency components in the digital representation of the
`frames. Since the file header structure and motion estima-
`tion can be retained,
`this method is substantially cheaper
`in implementation than to completely redo the compression,
`including computationally intense motion estimation. How-
`ever, this form of transcoding can affect the detectability of
`the watermark, particularly if the significant portions of the
`watermark are contained in high frequencies.
`For video recorders that redo compression, image quality
`usually degrades significantly. Usually alignment of indepen-
`dently coded I-frames between original and copy is impor-
`tant. If complete recompression occurs, quantization noise
`is present, typically with large high-frequency components.
`Moreover, at high frequencies, image and watermark com-
`ponents may be lost. In such cases, the watermark may be
`lost, though it may be that the video quality is significantly
`degraded.
`
`VI. INTENTIONAL ATTACKS
`In this section, we describe a series of attacks that can be
`mounted against a unrestricted-key watermark.
`
`A. Exploiting the Presence of a Watermark Detector Device
`An attacker may not have precise knowledge of the water-
`mark. Nevertheless, he usually has access to a detector and the
`detector provides information about whether a certain piece of
`content contains a watermark or not. This information can be
`used to remove the watermark. This model may be particularly
`appropriate in copy control applications, such as for DVD.
`The watermark detection and consequent playback restrictions
`require a uniform standard to be adhered to across all brands of
`players and recorders. On the other hand, the method to embed
`
`

`

`COX AND LINNARTZ: SOME GENERAL METHODS FOR TAMPERING WITH WATERMARKS
`
`591
`
`a watermark pattern that reliably triggers such detectors can
`be chosen by the content owner according to his requirements
`for robustness and perceptivity. Many different patterns may
`all have the same effect on a standard watermark detector. An
`attacker may not wish to remove the very watermark that the
`content owner has embedded, which may have been adapted
`according to a particular perceptual model. He only desires
`to extract a pattern that cancels the effect that the present
`watermark has on the detector.
`The aim of the attack is to experimentally deduce the
`behavior of the detector, and to exploit this knowledge to
`ensure that a particular image does not trigger the detector. For
`example, if the watermark detector gives a soft decision, e.g., a
`continuous reliability indication when detecting a watermark,
`the attacker can learn how minor changes to the image
`influence the strength of the detected watermark. That is,
`modifying the image pixel by pixel, he can deduce the entire
`correlation function or other watermark detection rule.
`Interestingly, such attack can also be applied even when the
`detector only reveals a binary decision, i.e., present or absent.
`Basically the attack examines an image that is at the boundary
`where the detector changes its decision from “absent” to
`“present.” For clarity the reader may consider a watermark
`detector of the correlator type; but this is not a necessary
`condition for the attack to work. For a correlator type of
`detector, our attack reveals the correlation coefficients used in
`the detector (or at least their sign) as in the following examples.
`1) Starting with a watermarked image, the attacker creates
`a test image that is near the boundary of a watermark
`being detectable. At this point it does not matter whether
`the resulting image resembles the original or not. The
`only criterion is that minor modifications to the test
`image cause the detector to respond with “watermark”
`or “no watermark” with a probability that is sufficiently
`different from zero or one. The attacker can create the
`test image by modifying a watermarked image step-by-
`step until the detector responds “no watermark found.”
`A variety of modifications are possible. One method is
`to gradually reduce the contrast in the image just enough
`to drop below the threshold where the detector reports
`the presence of the watermark. An alternative method is
`to replace more and more pixels in the image by neutral
`grey. There must be a point where the detector makes
`the transition from detecting a watermark to responding
`that the image contains no watermark. Otherwise this
`step would eventually result in an evenly grey colored
`image, and no reasonable watermark detector can claim
`that such image contains a watermark.
`2) The attacker now increases or decreases the luminance
`of a particular pixel until the detector sees the watermark
`again. This provides the insight of whether the water-
`mark embedder decreases or increases the luminance of
`that pixel.
`3) This step is repeated for every pixel in the image.
`4) Combining the knowledge on how sensitive the detector
`is to a modification of each pixel, the attacker estimates a
`combination of pixel values that has the largest influence
`on the detector for the least disturbance of the image.
`
`5) The attacker uses the original marked image and sub-
`times) the estimate, such that
`the detector
`tracts
`is found experi-
`reports that no watermark is present.
`mentally, such that
`is as small as possible. Moreover,
`the attacker may also exploit a perceptual model to
`minimize the visual effect of his modifications to the
`image.
`Our main argument here is that the effort needed to find
`the watermark is much less than commonly believed. If an
`pixels, conventional wisdom is that an
`image contains
`attack that searches the watermark requires an exponential
`A brute force exhaustive
`number of attempts of order
`search checking all combinations with positive and negative
`sign of the watermark in each pixel results in precisely
`attempts. The above method shows that most known water-
`marking methods can be broken much faster, namely in
`provided a device is available that outputs a binary (present
`or absent) decision as to the presence of the watermark.
`
`B. Attacks Based on the Presence of a Watermark Inserter
`If the attacker has access to a watermark inserter,
`this
`provides further opportunities to break the security. Attacks
`of this kind are relevant to DVD copy control in which copy
`generation management is required, i.e., the user is permitted
`to make a copy from the original source disc but
`is not
`permitted to make a copy of the copied material—only one
`generation of copying is allowed. The recorder should change
`the watermark status from “one copy allowed” to “no more
`copies allowed.” The attacker has access to the content before
`and after this marking. That is, he can create a difference
`image, by subtracting the unmarked original from the marked
`An obvious
`content. This difference image is equal to
`attack is to predistort the original to undo the mark addition
`in the embedder. That is, the attacker computes
`and hopes that after embedding of the watermark, the recorder
`stores
`
`The reason why most
`which is likely to approximate
`watermarking methods are vulnerable to this attack is that
`watermarking has to be robust to random noise addition. If,
`for reasons discussed before
`
`and because watermarks are small modifications themselves,
`This property enables the
`
`above predistortion attack.
`
`C. Attacks by Statistical Averaging
`An attacker may try to estimate the watermark and subtract
`this from a marked image. Such an attack is particularly
`dangerous if the attacker can find a generic watermark, for
`instance, one with
`not depending significantly
`on the image
`Such an estimate
`of the watermark can then
`be used to remove a watermark from any arbitrary marked
`image, without any further effort for each new image or frame
`to be “cleaned.”
`
`

`

`592
`
`IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 16, NO. 4, MAY 1998
`
`Fig. 1. An attacker could modify his recorder, such that it does not check for watermarks.
`
`Fig. 2. Scrambling as a means to defeat watermark detection.
`
`by adding or
`The attacker may separate the watermark
`averaging multiple images, e.g., multiple successive marked
`from a video sequence.
`images
`such images results in
`which
`The addition of
`tends to
`for large
`and sufficiently many and sufficiently
`independent images
`A countermeasure is to use at least two different watermarks
`and
`at random, say with probability
`and
`where
`respectively. The above attack then only produces
`without revealing
`or
`However a re-
`finement of the attack is to compute weighted averages, where
`the weight factor is determined by a (possibly unreliable but
`better than random) guess of whether a particular image con-
`tains one watermark or the other. For instance, the attacker
`if he believes that
`may put an image in category
`this image contains watermark
`Let
`denote the probabil-
`ity that an image is put into the wrong category. Then, after
`of images from category 1, the
`averaging a large number
`result converges to
`Similarly the sum of
`
`images in category 2 tends to
`Computing the
`
`weighted difference gives
`
`i.e., for any selection criterion better
`Hence for any
`than a random one, the attacker can estimate both the sum and
`and
`This reveals
`and
`difference of
`
`D. Attacks on the Copy Control Mechanism
`A pirate who is interested in illegal copying may not only
`attempt to tamper with the watermarked image, but can also
`attempt
`to circumvent
`the copy control mechanism while
`leaving the watermarked content unchanged. The most trivial
`attack is to tamper with the output of the watermark detector
`and modify it in such a way that the copy control mechanism
`always sees a “no watermark” detection, even if a watermark
`is present in the content (Fig. 1). Since hackers and pirates
`
`more easily can modify (their own!) recorders but not their
`customers’ players, playback control
`is a mechanism that
`detects watermarks during the playback of discs. The resulting
`tape or disc can be recognized as an illegal copy if playback
`control is used.
`Fig. 2 reveals that copy protection based on watermarking
`content has a further fundamental weakness. The watermark
`detection process is designed to detect the watermark when
`the video is perceptually meaningful. Thus, a user may apply
`a weak form of scrambling to copy protected video, e.g., in-
`verting the pixel intensities, prior to recording. The scrambled
`video is unwatchable and the recorder will fail to detect a
`watermark and consequently allow a copy to be made. Of
`course, on playback, the video signal will be scrambled, but the
`user may then simply invert or descramble the video in order to
`watch a perfect and illegal copy of a video. Simple scrambling
`and descrambling hardware would be very inexpensive and
`manufacturers might argue that the devices serve a legitimate
`purpose in protecting a user’s personal video. Similarly, digital
`MPEG can easily be converted into a file of seemingly random
`bits. One way to avoid such circumvention for digital recording
`is to only allow the recording of content in a recognized file
`format. Of course this would severely limit the functionality
`of the storage device.
`Moreover, it d

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket