DeSDMI

Menu
Home
Who are we?
What is SDMI?
FAQ
Forum
Related links
Disclaimer
Contact us

In depth
 • SDMI system overview
 • Attack methods
 • Technical report

 


Francais


English

Introduction
You should read the system overview before this. We now discuss what kind of attacks (by ascending power) can be mounted against the watermarking system.

Ok. First, there is the original song A. Then, it is marked to produce the song B.

A -> B
Then, there are two ways to attack it. The first obvious one, is to recover the original song A. The other, much easier, is to create a new song C, which will (a) be audibly close to the original (b) won't have a detectable mark. Note that there is an attack of that type which works all the time: ask musicians to decode and re-record the song :)

A <-> B -> C
So, depending on the understanding of the algorithm you have, we distinguish three types of attack:
  • Random attack Here, you don't even try to understand how the marking algorithm works. You just apply some kind of transformation to the song, and hope the mark can't be detected any more. If you can get fast answers from an oracle (which was not the case in the contest), this attack might be feasible. However, you might need a lot of trials before you actually succeed, and you have to check the quality once you have succeeded. Furthermore, this attack can hardly be automated.
  • Directed attack To mount this attack, you need partial understanding of the scheme. Then, you will apply transformation suited to disturb the detection process. For example, in you have understood that the marking process is only modifying the phase of the signal, you can try to apply all-pass filters or similar transformations. Naturally, the more you understand, and the highest your chances of success are. It might be possible to semi-automate this kind of attack. The only problems are (a) you cannot be sure the attack will work against every song, (b) you cannot be sure the final audio quality will be good enough for every song.
  • Surgical attack Here, you need an almost complete understanding of the inner workings of the scheme. The transformation you apply should simply remove the mark that has been inserted and recover exactly the original song. This kind of attack is, of course, very powerful. There aren't any audibility problems any more (the quality is actually better than the marked version), and you know the attack always succeed. With such an attack, you could code a filter that would automatically remove the mark of any song you download to your computer, thus defeating the whole purpose of the scheme.
We can more or less summarize these attacks in the following picture. The original song is A. The marked version B. The zone with the stripes is where you want to go to defeat the scheme, that is outside the detection region but in the audibility region (this zone is probably actually much smaller than on the picture). If you use a random attack, you might need a lot of time (maybe days) to finally fall in the right zone. If you use a directed attack, your odds are much better, they might even be close to 1 if your attack is very directed. Finally, if your attack is surgical, you win every time :)

Non textable picture. Sorry


Home | FAQ | Forum | Disclaimer | Contact us
Copyright © 2001 Julien Stern