Attacks on noises

Another kind of attack is based on analyzing rendered frames to predict the possible positions of distortion regions. Below is a simple result for extreme cases.

Proposition 4. Let I=R(S)I = \mathcal{R}\left(S\right) be the rendered frame of some scene S\mathcal{S}, if II is a constant signal or white noise then ANGV scheme is perfectly secure.

Proof. We prove for the case of constant signals, the argument for white noises is similar. For simplification, we do not take the constraints about the fidelity of watermarked signals in to account and suppose that II is the constant binary signal I(x,y)=0I\left(x,y\right) = 0. The distortions of any noise vector of length nn occurs at distinguished and uniformly random positions (xi,yi)1in\left(x_i,y_i\right)_{1 \leq i \leq n} on the image, or I^(xi,yi)=1\hat{I}\left(x_i,y_i\right) = 1 for all 1in1 \leq i \leq n. Since KverifK_{\mathtt{verif}} is a cryptographic hash, PC=PS=UInP_{\mathcal{C}} = P_{\mathcal{S}} = \mathcal{U}_{I}^{\otimes n}, hence D(PCPS)=0D\left(P_{\mathcal{C}} \mathrel{\Vert} P_{\mathcal{S}}\right) = 0.

Many researchers observe that the data watermarking can be considered as the communication over noisy channel where the watermarks are signals and the content data is noise [8], [21]. Under this perspective, the proposition above is actually a special case of the Shannon's noisy channel coding theorem. The spectrums of signals (as depicted in Figure 8) are Dirac pulses for constant signals and white noises for white noises, then noises can be indistinguishably inserted everywhere. From the attacker's point of view, there is no information to make any significant estimation about the positions of the watermark.

Figure 8

Last updated