Security of Watermarking Schemes Against Sensitivity Analysis Attacks
El Choubassi, Maha
This item is only available for download by members of the University of Illinois community. Students, faculty, and staff at the U of I may log in with your NetID and password to view the item. If you are trying to access an Illinois-restricted dissertation or thesis, you can request a copy through your library's Inter-Library Loan office or purchase a copy directly from ProQuest.
Permalink
https://hdl.handle.net/2142/81110
Description
Title
Security of Watermarking Schemes Against Sensitivity Analysis Attacks
Author(s)
El Choubassi, Maha
Issue Date
2008
Doctoral Committee Chair(s)
Moulin, Pierre
Department of Study
Electrical and Computer Engineering
Discipline
Electrical and Computer Engineering
Degree Granting Institution
University of Illinois at Urbana-Champaign
Degree Name
Ph.D.
Degree Level
Dissertation
Keyword(s)
Engineering, Electronics and Electrical
Language
eng
Abstract
"This conclusion calls for a design framework for watermark detectors encompassing all the requirements on the detector. In order to build such framework, we model sensitivity analysis attacks as a general watermark estimation problem in which the adversary controls how informative the measurements will be about the watermark. We evaluate the fundamental performance limits for the attacker's watermark estimation problem. The inverse of the Fisher information matrix provides an algorithm-independent bound on the covariance matrix of the estimation error. A general strategy for the attacker is to select the distribution of auxiliary test signals that minimizes the trace of the inverse Fisher information matrix. The watermark detector must trade off two conflicting requirements: (1) reliability, and (2) security against sensitivity attacks. We explore this tradeoff and design the detection function that maximizes the trace of the attacker's inverse Fisher information matrix while simultaneously guaranteeing an exponential upper bound on the error probability. Game theory is the natural framework to study this problem, and considerable insights emerge from this analysis. Finally, throughout the thesis, we apply our analysis to image watermarking, for which ""good"" statistical models are available, and hence the practical value of our work can be illustrated."
Use this login method if you
don't
have an
@illinois.edu
email address.
(Oops, I do have one)
IDEALS migrated to a new platform on June 23, 2022. If you created
your account prior to this date, you will have to reset your password
using the forgot-password link below.