ABSTRACT

This chapter describes that the pitfalls of the detectors when the detector is publicly available and introduces the generic attack, which aims at removing the watermark with minimum distortion. It explains possible implementations of the attack for the correlator and quantization-based detectors, describes the new detector structure with fractal decision boundary and provides a practical implementation of it. The chapter reviews the results that show that the distortion is essentially similar to the original detector. The deployment of multimedia protection algorithms to practical systems has moved to the standardization and implementation phase. Asymmetric detectors were suggested to make the problem of estimating the secret key for unauthorized parties more difficult. Techniques for data embedding using quantization are based on using two or more codebooks to represent the different symbols to be embedded. The chapter provides an effective implementation of the generalized attack using the simple least mean square algorithm for the class of correlation detectors.