attacks on copyright marking systems

18
$WWDFNVRQFRS\ULJKW PDUNLQJV\VWHPV )$33HWLWFRODV5-$QGHUVRQDQG0*.XKQ <http://www. cl .cam.ac. uk /~fapp2/papers/ih98-attacks/>

Upload: others

Post on 04-Feb-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Attacks on copyright marking systems

$WWDFNV�RQ�FRS\ULJKWPDUNLQJ�V\VWHPV

)�$�3��3HWLWFRODV��5�-��$QGHUVRQ�DQG�0�*��.XKQ

<http://www. cl .cam.ac. uk /~fapp2/papers/ih98-attacks/>

Page 2: Attacks on copyright marking systems

���$SULO����� $WWDFNV�RQ�FRS\ULJKW�PDUNLQJ�V\VWHPV �

:DWHUPDUNLQJ���FU\SWRJUDSK\

� ,WHUDWLYH�SURJUHVV

¤ $WWDFNV�ZLOO�OHDG�WR�PRUH�UREXVW�V\VWHPV

� 9DULRXV�DWWDFNV�RQ�PDUNLQJ�V\VWHPV

¤ 9HU\�VLPSOH��PDQXDO�

¤ *HQHUDO�EXW�VWLOO�VLPSOH��6WLU0DUN�

¤ 3URWRFRO�FRQVLGHUDWLRQV

¤ ,PSOHPHQWDWLRQ�FRQVLGHUDWLRQV

Page 3: Attacks on copyright marking systems

���$SULO����� $WWDFNV�RQ�FRS\ULJKW�PDUNLQJ�V\VWHPV �

(DUO\�H[SHULPHQW¥¨MLWWHU©�DWWDFN

skytale:SysCoP$ imageread_demo syscop_watermarked.ppmKey:

No certificate file.-------------------------------------------------A valid watermark found - estimated correction percentage is : 100Retrieved Secret Label (string) : SysCoP(TM)

skytale:SysCoP$ imageread_demo syscop_jitter.ppmKey:

No certificate file.-------------------------------------------------Cannon find valid watermark - failed.Image syscop_jitter.ppm has been tampered or hasnot been watermarked.

6\V&R3

Page 4: Attacks on copyright marking systems

���$SULO����� $WWDFNV�RQ�FRS\ULJKW�PDUNLQJ�V\VWHPV �

-LWWHU�DWWDFN�H[DPSOH

:DWHUPDUNHG -LWWHU�DGGHG

6\V&R3

Page 5: Attacks on copyright marking systems

���$SULO����� $WWDFNV�RQ�FRS\ULJKW�PDUNLQJ�V\VWHPV �

$�PRUH�JHQHUDO�DWWDFN

� 0DUNLQJ�VFKHPHV�UREXVW�WR�VLPSOH�WUDQVIRUPV�

¤ 5RWDWLRQ��FURSSLQJ��UHVFDOLQJ��HWF�

��VHSDUDWHO\

� ,GHD

¤ ([WHQVLRQ�RI�WKH�¨GLVWRUWLRQ©�DWWDFN

¤ 7U\�WR�PL[�WKHP�WRJHWKHU

� %HQFKPDUN�WRRO��6WLU0DUN

Page 6: Attacks on copyright marking systems

���$SULO����� $WWDFNV�RQ�FRS\ULJKW�PDUNLQJ�V\VWHPV �

6WLU0DUN

¤ $SSO\�PLQRU�JHRPHWULF�GLVWRUWLRQ�

� 6WUHWFKLQJ��VKHDULQJ��VKLIWLQJ�DQG�URWDWLRQ

� 6LPXODWH�SULQWLQJ�VFDQQLQJ�SURFHVV

¤ 8VH�¨VLQF©�IRU�UHFRQVWUXFWLRQ�IXQFWLRQ

Page 7: Attacks on copyright marking systems

���$SULO����� $WWDFNV�RQ�FRS\ULJKW�PDUNLQJ�V\VWHPV �

([DPSOH

2ULJLQDO

-.B3*6�������� 6WLU0DUN

3LFWXUH0DUF�������6\V&R3��'HPR���-.B3*6��6XUH6LJQ��(,.21$PDUN��3LWDV���1(&��&R[�HW�DO��

Page 8: Attacks on copyright marking systems

���$SULO����� $WWDFNV�RQ�FRS\ULJKW�PDUNLQJ�V\VWHPV �

(FKR�KLGLQJ

� +XPDQV�FDQQRW�SHUFHLYH�VKRUW�HFKRHV

� (FKR�SDUDPHWHUV

¤ 'HOD\��τ¤ 5HODWLYH�DPSOLWXGH��α

( ) ( ) ( )\ W [ W [ W= + −α τ

Page 9: Attacks on copyright marking systems

���$SULO����� $WWDFNV�RQ�FRS\ULJKW�PDUNLQJ�V\VWHPV �

&HSVWUXP�DODQ\VLV�,

( ) ( ) ( )\ W [ W [ W= + −α τ

( ) ( ) ( )( )Φ Φ\\ [[I I I= + +� � � �α πτ αFRV

( ) ( ) ( )ORJ ORJ FRVΦ Φ\\ [[I I I≈ + � �α πτ

SRZHU�VSHFWUXP

ORJ

ULSSOH�TXHIUHQF\�τ

Page 10: Attacks on copyright marking systems

���$SULO����� $WWDFNV�RQ�FRS\ULJKW�PDUNLQJ�V\VWHPV ��

&HSVWUXP�DODQ\VLV�,,

� 6HSDUDWHV�FRPSRQHQWV

� 3UREOHP�ZKHQ�GHOD\�LV�VKRUW

τ ↓

Page 11: Attacks on copyright marking systems

���$SULO����� $WWDFNV�RQ�FRS\ULJKW�PDUNLQJ�V\VWHPV ��

(FKR�GHWHFWRU

τ

α

GHWHFWHG�τ

τ

α

GHWHFWHG�τ

:LWK�D�SLHFHRI�PXVLF

:LWK�D�UDQGRPVLJQDO

�,Q�ERWK�FDVHV��DYHUDJH�RQ����VDPSOHV�FKRVHQ�UDQGRPO\�

Page 12: Attacks on copyright marking systems

���$SULO����� $WWDFNV�RQ�FRS\ULJKW�PDUNLQJ�V\VWHPV ��

'HWHFWHG�HFKR

Page 13: Attacks on copyright marking systems

���$SULO����� $WWDFNV�RQ�FRS\ULJKW�PDUNLQJ�V\VWHPV ��

:HE�FUDZOHUV�IRU�ZDWHUPDUNV

� 0RVW�DSSHDOLQJ�DSSOLFDWLRQ

¤ :HE�FUDZOHU�GRZQORDG�LPDJHV

¤ &KHFN�ZKHWKHU�WKH\�FRQWDLQ�D�ZDWHUPDUN

¤ 3URGXFH�UHSRUWV�IRU�FRS\ULJKW�RZQHUV

H�J��0DUF6SLGHU�E\�'LJLPDUF��3RUWODQG��25

� +RZ�GR�\RX�SUHYHQW�VXFK�FUDZOHUV�IURPUHSRUWLQJ�\RXU�SLFWXUHV"

Page 14: Attacks on copyright marking systems

���$SULO����� $WWDFNV�RQ�FRS\ULJKW�PDUNLQJ�V\VWHPV ��

$WWDFNV�RQ�ZHE�FUDZOHUV�,

� ¨0RVDLF©�DWWDFN

¤ :DWHUPDUNLQJ�FDQQRW�KDQGOH�VPDOO�LPDJHV

¤ 6SOLW�LPDJHV�LQ�VPDOO�SLHFHV��H�J�����×����� -DYD�DSSOHWV�$FWLYH;�REMHFWV

¤ ,PDJH�GLVSOD\HG�ZLWK�-DYD�DSSOHW�DXWRPDWLFDOO\�RUDIWHU�FHUWDLQ�DFWLRQV�RI�WKH�XVHU

¤ &DQ�HYHQ�EH�GH�VFUDPEOHG�¨RQ�WKH�IO\©

� 5HIXVH�FRQQHFWLRQ��VSRRILQJ��ORJLQ��SD\PHQW

Page 15: Attacks on copyright marking systems

���$SULO����� $WWDFNV�RQ�FRS\ULJKW�PDUNLQJ�V\VWHPV ��

¨0RVDLF©�DWWDFN

Page 16: Attacks on copyright marking systems

���$SULO����� $WWDFNV�RQ�FRS\ULJKW�PDUNLQJ�V\VWHPV ��

3URWRFRO�FRQVLGHUDWLRQV

� ,%0�DWWDFN��GHDG�ORFN

¤ 2ULJLQDO

¤ *HQXLQH�PDUN

¤ 3XEOLVKHG ¤ $WWDFNHU©V�PDUN�

¤ &ODLPHG�RULJLQDO�

2

Z

Z23 +=� Za

Z32 a�a

−=

6��&UDYHU��1��0HPRQ��%��/��<HR�DQG�0�0��<HXQJ��&DQLQYLVLEOH�ZDWHUPDUN�UHVROYH�ULJKWIXO�RZQHUVKLSV"��63,(�����RU�,%0�5HVHDUFK�5HSRUW�5&��������0DUFK�����

3 2

Z < <

< <

2a

Za

Page 17: Attacks on copyright marking systems

���$SULO����� $WWDFNV�RQ�FRS\ULJKW�PDUNLQJ�V\VWHPV ��

,PSOHPHQWDWLRQ�FRQVLGHUDWLRQV

� 6DPH�DV�FU\SWR��VHH�$QGHUVRQ��¨:K\�FU\SWRV\VWHPV�IDLO"©�

� 'LJLPDUF

¤ 7ULDO�HUURU�VHDUFK�RQ���GLJLW�3,1�QXPEHU

¤ 'HEXJJLQJ�WRROV�WR�FKDQJH�VRIWZDUH�EHKDYLRU

� -DYD�EDVHG�VRIWZDUH

¤ ,PDJH*XDUGLDQ��6DIH,PDJH

� ,PDJHV�DSSHDU�LQ�WKH�FDFKH

� 0RFKD��'HMDYX��:LQJGLV

Page 18: Attacks on copyright marking systems

���$SULO����� $WWDFNV�RQ�FRS\ULJKW�PDUNLQJ�V\VWHPV ��

&RQFOXVLRQ

� )LUVW�JHQHUDWLRQ�RI�FRS\ULJKW�PDUNLQJ�VFKHPHVLV�QRW�VWURQJ�HQRXJK

� ([LVWLQJ�VFKHPHV�SURYLGH�RQO\�OLPLWHGPHDVXUHV

� &DQ�RQO\�PHHW�IHZ�UHTXLUHPHQWV�DW�D�WLPH

¤ %DQGZLGWK�YV��UREXVWQHVV

� 5HDO�SUREOHP��ZDWHUPDUN�UHVWRUDWLRQ