`
`587
`
`Some General Methods for
`Tampering with Watermarks
`
`Ingemar J. Cox, Senior Member, IEEE, and Jean-Paul M. G. Linnartz, Member, IEEE
`
`Abstract—Watermarks allow embedded signals to be extracted
`from audio and video content for a variety of purposes. One
`application is for copyright control, where it is envisaged that
`digital video recorders will not permit the recording of content
`that is watermarked as “never copy.” In such a scenario, it
`is important that the watermark survive both normal signal
`transformations and attempts to remove the watermark so that
`an illegal copy can be made. In this paper, we discuss to what
`extent a watermark can be resistant to tampering and describe
`a variety of possible attacks.
`
`I. INTRODUCTION
`
`an average user to circumvent the copy protection system, by
`for example, removing the watermark.
`This paper discusses the susceptibility of watermarking
`algorithms to tampering. We assume that the reader is aware
`of typical watermark methods (e.g., [2]–[7], [13]). A compre-
`hensive review is included in [9] Section II describes what
`is meant by an “unrestricted-key” watermark and Section III
`outlines how a public watermark will be used for copy control
`of DVD disks. In Section IV, we introduce some notation.
`In Section V, we describe how signal processing affects the
`detectability of the watermark. In Section VI, we then describe
`a series of attacks that may be used to remove a watermark.
`
`THE DIGITAL distribution of copyrighted content is at-
`
`tractive to content owners. However, the possibility of
`making an unlimited number of perfect digital copies is a
`serious concern. While it is acknowledged that professional
`piracy is unlikely to be prevented by technological means
`alone, it is hoped that the illegal casual copying that occurs
`in the home can be prevented by a combination of encryption
`and watermarking. For example, copyrighted video content
`intended for the digital versatile disk (DVD) will be scrambled
`before being placed on a disk, much like premium channels
`for cable TV. However, after descrambling, the content is
`unprotected, which is why a watermark or embedded signal
`will also be placed in the content. Digital video players
`will look for watermarks in copyrighted material and prevent
`playback if a “never copy” watermark is detected in material
`whose source is known to be a recordable disk. Similarly,
`digital video recorders will not record material if a “never
`copy” watermark is detected.
`The above example is an oversimplification of the copyright
`protection system being designed for DVD. Nevertheless, it
`serves to illustrate an application in which millions of digital
`video players must be capable of reading signals embedded
`in the video content. In such a scenario,
`it
`is imperative
`that the watermark survive common video signal transfor-
`mations, especially MPEG-2 compression and recompression
`and analog-to-digital and digital-to-analog conversions, since
`copies of content originally stored in compressed form on a
`DVD disc might subsequently be copied onto an analog VHS
`tape before being redigitized and recompressed by a writable
`DVD recorder. Just as importantly, it should not be trivial for
`
`Manuscript received August, 1997; revised October, 1997. This paper was
`presented in part at the IEEE International Conference on Image Processing
`in 1997 and appeared in part in the CD-ROM version of the same conference.
`I. J. Cox is with NEC Research Institute, Princeton, NJ 08540 USA.
`J.-P. M. G. Linnartz is with Natuurkundig Laboratorium, WY8, Philips
`Research, 5656 AA Eindhoven, The Netherlands.
`Publisher Item Identifier S 0733-8716(98)01448-6.
`
`II. RESTRICTED AND UNRESTRICTED-KEY WATERMARKING
`The requirements for watermarking differ between applica-
`tions. An important distinguishing characteristic is the level
`of restriction placed on the ability to read a watermark. For
`example, in many cases, it is desirable to embed information
`in audio, image, or video content such that this information
`is readable by many receivers. For instance, in an applica-
`tion such as transferring copyright ownership information by
`watermarking news photographs, any and all receiving users
`should be capable of reading the embedded information.
`In the past [8], we have described such systems as “public”
`watermarks, drawing analogy with public key cryptography.
`However, this is misleading. All currently known watermark-
`ing algorithms fall
`into the category of secret key cryp-
`tographic algorithms and their functionality depends of the
`restrictions placed on the watermark key. Thus, we prefer to
`describe watermarks in which the key is available to a very
`large number of detectors as “unrestricted-key” watermarks.
`To the best of our knowledge, no equivalent to public key
`encryption is currently available for watermarking.
`The key itself may simply be a pseudorandom number
`sequence that is embedded in all images or might be some
`parameters of the original unwatermarked image, such that a
`different key is used for each different image.
`If security is an utmost concern, a content owner may
`desire to restrict access to information about the key, i.e.,
`the watermark is only readable from a limited number of
`trusted receivers that share that secret. Or, a content owner
`may wish to ensure that the embedded information is most
`resistant to tampering. In these circumstances, one can use a
`restricted-key embedding method. Knowledge of this secret
`key is needed to embed the watermark and also to detect the
`watermark. It is common for such a secret key to include
`information about the original unwatermarked image. This can
`Sony Exhibit 1046
`0733–8716/98$10.00 © 1998 IEEE
`Sony v. MZ Audio
`
`
`
`588
`
`IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 16, NO. 4, MAY 1998
`
`make detection significantly more robust and consequently, the
`watermark becomes much more difficult for a pirate to remove.
`An hypothetical example of restricted-key watermarking is in
`the recording industry, that might choose to use watermarks
`to automatically monitor and log the music that is broadcast.
`This facilitates the transfer of airplay royalties to the music
`industry. In a scenario where monitoring receivers are located
`“in the field,” the watermark embedding system as well as any
`and all receiving monitors can be owned and operated by the
`royalty collection agency.
`A similar scenario can be used for a service in which images
`are watermarked and search robots scan the Internet to find
`illegally posted copies of these images. In this scenario it is not
`a fundamental problem that the watermark detector contains
`sensitive secret data, i.e., a detection key, that would reveal
`how the watermark can be erased. Potential attackers do not,
`in principle, have access to a watermark detector. However, a
`security threat occurs if a detector may accidentally fall into
`the hands of a malicious user.
`Different applications require different levels of robustness
`and security or tamper resistance. For example,
`the radio
`station application only requires that the watermark be de-
`tectable after the signal distortions caused by the normal radio
`transmission process, i.e., it does not need to be tamper resis-
`tant. After all, even if the radio station were able to remove
`these marks, they cannot do it often without being detected
`by random checks, because these transmissions are public.
`However, for the DVD “never copy” application, the pirated
`content may be kept private, so no such outside auditing is
`possible. Hence a much greater security and resistance to
`tampering is desirable.
`Copy protection applications require that a watermark can
`be read by anyone, even by potential copyright pirates, but
`nonetheless only the sender should be able to embed and
`erase the watermark. An unrestricted-key watermarking is thus
`preferred, though other solutions are possible. For example, a
`restricted-key algorithm placed in a tamper-resistant box can
`be used. However, this approach has weaknesses and other
`disadvantages. An attacker may be able to reverse engineer
`the tamper-resistant box. For the consumer electronics and
`computer industry, the logistics of the manufacturing process
`are more complicated and less flexible if secret data has to
`be handled during design, prototyping, testing, debugging,
`and quality control. Some of the attacks to be described in
`Section VI exploit the very problem that algorithms which are
`inherently “secret key” in nature, are used in an environment
`where public detection properties are desired, i.e., access to
`the key is almost completely unrestricted.
`
`III. USAGE OF UNRESTRICTED-KEY WATERMARKS
`FOR DVD VIDEO COPY PROTECTION
`For consumers, the image quality of digital video disks
`provides a significant improvement over the quality of existing
`home video equipment, such as VHS recorders. However, for
`content providers, there is a greater risk of illegal copying,
`since each DVD copy is a perfect digital reproduction. The
`first aim of copy protection schemes is to prevent illegal copies
`
`from being made. Failing that, the aim is to reduce the value
`of illegal copies, either by reducing their quality (hopefully to
`the point of being unwatchable) or by restricting their use.
`Copy protection in DVD is supported by three means. First,
`the video material is encrypted. Thus, a digital copy of the
`encrypted disk will not play on compliant DVD players. This
`is because the disk key will not match. Clearly, encryption is
`very useful, but the key is less than 40 bits, in order to avoid
`export control restrictions. Another possible weakness is that it
`is important that the playback system cannot be circumvented.
`This is easier to achieve in a consumer electronic device that is
`a closed black box, but potentially significantly more difficult
`for personal computers.
`If the video material remains encrypted, then there is no
`need for watermarking. However,
`there are several ways
`that a copyrighted and encrypted video might be copied as
`an unencrypted, in-the-clear video, thereby losing the copy
`protection afforded through scrambling. Ignoring the issue of
`compliance, which is dealt with in Section VI-D, in-the-clear
`copies of encrypted material are most likely to occur through
`subsequent recording of the descrambled video. The in-the-
`clear video signal is available at a variety of sources. In the
`analog domain it is present in the NTSC signal and/or the RGB
`signal. And in the very near future, uncompressed digital video
`is likely to be available over the IEEE 1394 “Firewire” serial
`interface.
`To prevent analog copying, DVD players are equipped with
`an analog protection system (APS). This is a proprietary
`technology that modifies the generated NTSC signal such
`that most VHS video recorders cannot record a high-quality
`copy despite the fact that the same signal does not affect the
`TV display. Unfortunately, this system does not protect RGB
`signals, which are common to PC’s, from analog recording
`and is therefore easily circumventable. Thus, some percentage
`of copyrighted video material will find its way into the analog
`domain.
`The most likely source of a high-quality digital copy is
`through the digitization of this analog copy. Neither encryption
`nor the APS signaling prevent playback or recording of this
`illegal copy. The third line of defense is a watermark that is
`inserted into the video sequence. This watermark is intended to
`survive MPEG-2 compression and digital-to-analog-to-digital
`conversions, i.e., if the video fidelity remains high, then the
`watermark should remain detectable.
`A watermark in the video data can be used to prevent illegal
`copying by telling a compliant device not to copy it. It can
`also reduce the value of illegal copies by preventing them from
`being played on compliant devices. This means that consumers
`will have a choice between: 1) compliant devices, that can
`play legal, store-bought disks that were encrypted, but cannot
`play pirated disks and 2) noncompliant devices, that can play
`pirated material, but cannot play encrypted disks.
`For the DVD application, the watermark inserted into a
`piece of video must describe the restrictions on that video’s
`usage. Toward this end, the Copy Protection Technical Work-
`ing Group (CPTWG) of the DVD consortium has proposed
`that the watermark encode the following four bits shown in
`Table I.
`
`
`
`COX AND LINNARTZ: SOME GENERAL METHODS FOR TAMPERING WITH WATERMARKS
`
`589
`
`TABLE I
`
`The copy generation management system (CGMS) is in-
`tended to support one generation of copying, i.e., in some
`circumstances, users will be able to make a digital copy, but
`the system should prevent copies of this copy (or subsequent
`copies) being made. There is no limit to the number of one
`generation copies that can be made. In order to implement
`the “copy once” functionality of CGMS, it will probably be
`necessary to have one or more additional bits in the watermark
`that can be easily changed by consumer DVD devices.
`
`A. Technical Requirements
`The requirements placed on watermarking algorithms for the
`above application differ from those for other applications that
`are currently in the market, such as identification of ownership.
`The application of watermarking for copy protection requires a
`low bit rate and allows the use of many frames for watermark
`detection. However, since watermark detectors must be built
`into millions of low-cost, consumer devices, and since these
`detectors must work at video rates, there is a very strong
`requirement that the detector be extremely simple and cheap.
`Furthermore, since the DVD standard employs MPEG coding,
`the watermarking method must work well with MPEG. These
`last two requirements are challenging design specifications.
`The requirements for the APS bits are:
`1) detectable in the compressed and baseband video;
`2) detector should be very inexpensive both in terms of
`gate count (hardware) or MIPS (software);
`3) no visible artifacts, i.e., very high image fidelity;
`4) tamper resistant, i.e., it should not be easily circum-
`vented or removed;
`5) watermark should survive color representation conver-
`sion from YUV to RGB;
`6) data rate of 2 bits per frame;
`7) permanent—the APS bits do not need to be altered.
`The requirements for the playback control and copy gener-
`ation system are:
`1) detectable in the baseband and/or compressed video;
`2) 2–5 of APS requirements;
`3) data rate low (e.g., 2 bits per 100 frames);
`4) field encodable for generation control—multiple water-
`marks using possibly different methods though detection
`circuitry should preferable be the same;
`5) ability to increment (for generation control).
`
`Both systems should also survive:
`1) compression;
`2) decompression;
`3) digital-to-Analog;
`4) analog-to-Digital;
`5) standards conversion, e.g., analog video recorder (VHS),
`the European broadcast standard PAL, the French broad-
`cast standard SECAM;
`6) time dilation—changes in frames rate.
`
`IV. FORMULATION OF A MODEL
`the
`Mathematically, given an image
`and a watermark
`watermarked image,
`such
`is formed by
`denotes the perceptual
`where
`that
`difference, and
`refers to just noticeable difference, i.e.,
`the watermarked image is constrained to be visually identical
`(or very similar) to the original unwatermarked image.
`In theory, the function may be arbitrary, but in practice
`can be
`robustness requirements pose constraints on how
`chosen. One requirement
`is that watermarking has to be
`robust to random noise addition. Therefore many watermark
`designers opt for a scheme in which image will result in
`approximately the same watermark as a slightly altered image
`with
`In such cases
`.
`For an unrestricted-key watermark, detection of the water-
`is typically achieved by correlating the watermark
`mark,
`with some function,
`of the watermarked image.
`Example: In its basic form, in one half of the pixels the
`luminance is increased by one unit step while the luminance
`is kept constant [3] or decreased by one unit step [2] in the
`other half. Detection by summing luminances in the first subset
`and subtracting the sum of luminances in the latter subset
`is a special case of a correlator. One can describe this as
`with
`and where
`The
`detector computes
`where
`denotes the scalar product
`of two vectors.
`is chosen at random, then the distribution of
`If
`will tend to be quite small, as the random terms will tend
`to cancel themselves out, leaving only a residual variance.
`However, in computing
`all of the terms are positive,
`and will thus add up. For this reason, the product
`will be close to
`In particular, for
`sufficiently large images, it will be large, even if the magnitude
`of
`is much larger than the magnitude of
`It turns out
`that the probability of making an incorrect detection can be
`expressed as the complementary error function of the square
`root of the ratio
`over the variance in pixel luminance
`values. This result is very similar to expressions commonly
`encountered in digital transmission over noisy radio channels.
`A derivation is outside the scope of this paper, so we refer
`the interested reader to [12] for a detailed evaluation of the
`statistical behavior of
`and
`
`V. SIGNAL TRANSFORMATIONS
`The above specification may not seem difficult since it only
`requires the embedding of 4 bits of information in a data
`stream and if detection is only expected every 10 s say, then
`
`
`
`590
`
`IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 16, NO. 4, MAY 1998
`
`30
`480
`the total video data is approximately 720
`10. This is over 100 Mbytes prior to MPEG compression.
`However, the constraints of 1) maintaining image fidelity, and
`2) surviving common signal transformations, can be severe. In
`particular, many signal transformations cannot be modeled by
`a simple linear additive noise process. Instead, such processes
`are highly spatially correlated and may interact with the
`watermark in complex ways.
`transformations
`There are a number of common signal
`that a watermark should survive, e.g., affine transformations,
`compression/recompression, and noise. In some circumstances,
`it may be possible to design a watermark that is completely
`invariant to a particular transformation. For example, this is
`usually the case for translational motions. However, scale
`changes are often much more difficult to design for and it
`may be the case that a watermark algorithm is only robust to
`small perturbations in scale. In this case, a series of attacks
`may be mounted by identifying the limits of a particular wa-
`termarking scheme and subsequently finding a transformation
`that is outside of these limits yet maintains adequate image
`fidelity.
`
`A. Attacks by Affine Transformations
`Shifts over a few pixels can cause watermarking detectors to
`miss the presence of watermark. The problem can be illustrated
`by our example watermarking scheme. Suppose one shifts
`by one pixel, obtaining
`Let
`and
`denote the similarly
`shifted versions of
`and
`Then
`will tend to cancel
`As before, the random
`terms in
`themselves out. However, the
`terms will also cancel
`value was chosen independently.
`themselves out, if each
`Hence,
`will have small magnitude and the watermark
`will not be detected.
`Typical analog VHS recorders cause shifting over a small
`portion of a line, but enough to cause a shift of several pixels or
`even a few DCT blocks. Recorder time jitter and tape wear are
`a significant cause of stretching of a image. Even if the effects
`are not disturbing to a viewer, it may completely change the
`alignment of the watermark with respect to pixels and DCT
`block boundaries.
`There are a number of defenses against such attacks. Ideally,
`one would like to reverse the affine transformations. Given an
`original, a reasonable approximation to the distortion can be
`computed. With unrestricted-key watermarks, and in particular
`the “do not copy” application, no original is available. A
`secondary signal, i.e., a registration pattern, may be inserted
`into the image whose entire purpose is to assist in reversing
`the transformation. However, one can base attacks on this
`secondary signal, removing or altering it in order to block
`detection of the watermark. The mark components can be
`positioned at key visual features of the image, e.g., in patches
`whose average luminosity is at a local maximum. Finally,
`one can insert the mark into features that are transformation
`invariant. For example, the magnitudes of Fourier coefficients
`are translation invariant.
`In some applications, it may be assumed that the extent of
`the affine transformation is minor.
`
`B. Attacks by Noise Addition
`A common misunderstanding is that a watermark of small
`amplitude can be removed by adding random noise of a similar
`amplitude. On the contrary, correlation detectors appear very
`robust against addition of a random noise term For instance
`if
`one can describe the attacked image as
`The detector computes
`The product
`If the watermark was designed
`largely exceeding the statistical spreading in
`with
`it will mostly also largely exceed the statistical spreading in
`In practice, noise mostly is not a serious threat unless
`(in the frequency components of relevance) the noise is large
`or if the noise is correlated with the
`compared to image
`watermark.
`
`C. Attacks by Digital Compression: Future Digital Recorders
`Digital recorders may not always make a bit exact copy.
`Digital recorders will, at least initially, not contain sophis-
`ticated signal processing facilities. For recording of MPEG
`streams onto media with limited storage capacity, the recorder
`may have to reduce the bit rate of the content.
`This will particularly be the case for high-quality high-rate
`source video such as high-definition broadcasts. A commonly
`adopted method is to more coarsely quantize the high (spatial)
`frequency components in the digital representation of the
`frames. Since the file header structure and motion estima-
`tion can be retained,
`this method is substantially cheaper
`in implementation than to completely redo the compression,
`including computationally intense motion estimation. How-
`ever, this form of transcoding can affect the detectability of
`the watermark, particularly if the significant portions of the
`watermark are contained in high frequencies.
`For video recorders that redo compression, image quality
`usually degrades significantly. Usually alignment of indepen-
`dently coded I-frames between original and copy is impor-
`tant. If complete recompression occurs, quantization noise
`is present, typically with large high-frequency components.
`Moreover, at high frequencies, image and watermark com-
`ponents may be lost. In such cases, the watermark may be
`lost, though it may be that the video quality is significantly
`degraded.
`
`VI. INTENTIONAL ATTACKS
`In this section, we describe a series of attacks that can be
`mounted against a unrestricted-key watermark.
`
`A. Exploiting the Presence of a Watermark Detector Device
`An attacker may not have precise knowledge of the water-
`mark. Nevertheless, he usually has access to a detector and the
`detector provides information about whether a certain piece of
`content contains a watermark or not. This information can be
`used to remove the watermark. This model may be particularly
`appropriate in copy control applications, such as for DVD.
`The watermark detection and consequent playback restrictions
`require a uniform standard to be adhered to across all brands of
`players and recorders. On the other hand, the method to embed
`
`
`
`COX AND LINNARTZ: SOME GENERAL METHODS FOR TAMPERING WITH WATERMARKS
`
`591
`
`a watermark pattern that reliably triggers such detectors can
`be chosen by the content owner according to his requirements
`for robustness and perceptivity. Many different patterns may
`all have the same effect on a standard watermark detector. An
`attacker may not wish to remove the very watermark that the
`content owner has embedded, which may have been adapted
`according to a particular perceptual model. He only desires
`to extract a pattern that cancels the effect that the present
`watermark has on the detector.
`The aim of the attack is to experimentally deduce the
`behavior of the detector, and to exploit this knowledge to
`ensure that a particular image does not trigger the detector. For
`example, if the watermark detector gives a soft decision, e.g., a
`continuous reliability indication when detecting a watermark,
`the attacker can learn how minor changes to the image
`influence the strength of the detected watermark. That is,
`modifying the image pixel by pixel, he can deduce the entire
`correlation function or other watermark detection rule.
`Interestingly, such attack can also be applied even when the
`detector only reveals a binary decision, i.e., present or absent.
`Basically the attack examines an image that is at the boundary
`where the detector changes its decision from “absent” to
`“present.” For clarity the reader may consider a watermark
`detector of the correlator type; but this is not a necessary
`condition for the attack to work. For a correlator type of
`detector, our attack reveals the correlation coefficients used in
`the detector (or at least their sign) as in the following examples.
`1) Starting with a watermarked image, the attacker creates
`a test image that is near the boundary of a watermark
`being detectable. At this point it does not matter whether
`the resulting image resembles the original or not. The
`only criterion is that minor modifications to the test
`image cause the detector to respond with “watermark”
`or “no watermark” with a probability that is sufficiently
`different from zero or one. The attacker can create the
`test image by modifying a watermarked image step-by-
`step until the detector responds “no watermark found.”
`A variety of modifications are possible. One method is
`to gradually reduce the contrast in the image just enough
`to drop below the threshold where the detector reports
`the presence of the watermark. An alternative method is
`to replace more and more pixels in the image by neutral
`grey. There must be a point where the detector makes
`the transition from detecting a watermark to responding
`that the image contains no watermark. Otherwise this
`step would eventually result in an evenly grey colored
`image, and no reasonable watermark detector can claim
`that such image contains a watermark.
`2) The attacker now increases or decreases the luminance
`of a particular pixel until the detector sees the watermark
`again. This provides the insight of whether the water-
`mark embedder decreases or increases the luminance of
`that pixel.
`3) This step is repeated for every pixel in the image.
`4) Combining the knowledge on how sensitive the detector
`is to a modification of each pixel, the attacker estimates a
`combination of pixel values that has the largest influence
`on the detector for the least disturbance of the image.
`
`5) The attacker uses the original marked image and sub-
`times) the estimate, such that
`the detector
`tracts
`is found experi-
`reports that no watermark is present.
`mentally, such that
`is as small as possible. Moreover,
`the attacker may also exploit a perceptual model to
`minimize the visual effect of his modifications to the
`image.
`Our main argument here is that the effort needed to find
`the watermark is much less than commonly believed. If an
`pixels, conventional wisdom is that an
`image contains
`attack that searches the watermark requires an exponential
`A brute force exhaustive
`number of attempts of order
`search checking all combinations with positive and negative
`sign of the watermark in each pixel results in precisely
`attempts. The above method shows that most known water-
`marking methods can be broken much faster, namely in
`provided a device is available that outputs a binary (present
`or absent) decision as to the presence of the watermark.
`
`B. Attacks Based on the Presence of a Watermark Inserter
`If the attacker has access to a watermark inserter,
`this
`provides further opportunities to break the security. Attacks
`of this kind are relevant to DVD copy control in which copy
`generation management is required, i.e., the user is permitted
`to make a copy from the original source disc but
`is not
`permitted to make a copy of the copied material—only one
`generation of copying is allowed. The recorder should change
`the watermark status from “one copy allowed” to “no more
`copies allowed.” The attacker has access to the content before
`and after this marking. That is, he can create a difference
`image, by subtracting the unmarked original from the marked
`An obvious
`content. This difference image is equal to
`attack is to predistort the original to undo the mark addition
`in the embedder. That is, the attacker computes
`and hopes that after embedding of the watermark, the recorder
`stores
`
`The reason why most
`which is likely to approximate
`watermarking methods are vulnerable to this attack is that
`watermarking has to be robust to random noise addition. If,
`for reasons discussed before
`
`and because watermarks are small modifications themselves,
`This property enables the
`
`above predistortion attack.
`
`C. Attacks by Statistical Averaging
`An attacker may try to estimate the watermark and subtract
`this from a marked image. Such an attack is particularly
`dangerous if the attacker can find a generic watermark, for
`instance, one with
`not depending significantly
`on the image
`Such an estimate
`of the watermark can then
`be used to remove a watermark from any arbitrary marked
`image, without any further effort for each new image or frame
`to be “cleaned.”
`
`
`
`592
`
`IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 16, NO. 4, MAY 1998
`
`Fig. 1. An attacker could modify his recorder, such that it does not check for watermarks.
`
`Fig. 2. Scrambling as a means to defeat watermark detection.
`
`by adding or
`The attacker may separate the watermark
`averaging multiple images, e.g., multiple successive marked
`from a video sequence.
`images
`such images results in
`which
`The addition of
`tends to
`for large
`and sufficiently many and sufficiently
`independent images
`A countermeasure is to use at least two different watermarks
`and
`at random, say with probability
`and
`where
`respectively. The above attack then only produces
`without revealing
`or
`However a re-
`finement of the attack is to compute weighted averages, where
`the weight factor is determined by a (possibly unreliable but
`better than random) guess of whether a particular image con-
`tains one watermark or the other. For instance, the attacker
`if he believes that
`may put an image in category
`this image contains watermark
`Let
`denote the probabil-
`ity that an image is put into the wrong category. Then, after
`of images from category 1, the
`averaging a large number
`result converges to
`Similarly the sum of
`
`images in category 2 tends to
`Computing the
`
`weighted difference gives
`
`i.e., for any selection criterion better
`Hence for any
`than a random one, the attacker can estimate both the sum and
`and
`This reveals
`and
`difference of
`
`D. Attacks on the Copy Control Mechanism
`A pirate who is interested in illegal copying may not only
`attempt to tamper with the watermarked image, but can also
`attempt
`to circumvent
`the copy control mechanism while
`leaving the watermarked content unchanged. The most trivial
`attack is to tamper with the output of the watermark detector
`and modify it in such a way that the copy control mechanism
`always sees a “no watermark” detection, even if a watermark
`is present in the content (Fig. 1). Since hackers and pirates
`
`more easily can modify (their own!) recorders but not their
`customers’ players, playback control
`is a mechanism that
`detects watermarks during the playback of discs. The resulting
`tape or disc can be recognized as an illegal copy if playback
`control is used.
`Fig. 2 reveals that copy protection based on watermarking
`content has a further fundamental weakness. The watermark
`detection process is designed to detect the watermark when
`the video is perceptually meaningful. Thus, a user may apply
`a weak form of scrambling to copy protected video, e.g., in-
`verting the pixel intensities, prior to recording. The scrambled
`video is unwatchable and the recorder will fail to detect a
`watermark and consequently allow a copy to be made. Of
`course, on playback, the video signal will be scrambled, but the
`user may then simply invert or descramble the video in order to
`watch a perfect and illegal copy of a video. Simple scrambling
`and descrambling hardware would be very inexpensive and
`manufacturers might argue that the devices serve a legitimate
`purpose in protecting a user’s personal video. Similarly, digital
`MPEG can easily be converted into a file of seemingly random
`bits. One way to avoid such circumvention for digital recording
`is to only allow the recording of content in a recognized file
`format. Of course this would severely limit the functionality
`of the storage device.
`Moreover, it d