12
894 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 3, SEPTEMBER 2011 A Message-Passing Approach to Combating Desynchronization Attacks Shankar Sadasivam, Student Member, IEEE, Pierre Moulin, Fellow, IEEE, and Todd P. Coleman, Member, IEEE Abstract—We propose a new paradigm for blind watermark decoding in the presence of desynchronization attacks. Employing Forney-style factor graphs to model the watermarking system, we cast the blind watermark decoding problem as a probabilistic inference problem on a graph, and solve it via message-passing. We study a wide range of moderate to strong attacks including scaling, amplitude modulation, fractional shift, arbitrary linear and shift-invariant ltering, and blockwise ltering, and show that the graph-based iterative decoders perform almost as well as if they had exact knowledge of the desynchronization attack parameters. Other desirable features of the graph-based decoders include the exibility to adapt to other types of attacks and the ability to cope with the “curse of dimensionality” problem that seemingly results when the desynchronization parameter space has high dimensionality. These properties are unlike most blind watermark decoders proposed to date. Index Terms—Blind watermark decoding, data hiding, desyn- chronization attacks, Forney factor graphs, graphical models, joint estimator-detector, Markov random elds, message passing, quan- tization index modulation (QIM). I. INTRODUCTION T HE advent of the Internet and other public information sharing networks has given rise to a multitude of appli- cations (e.g., copyright protection for digital media, content au- thentication, media forensics, database annotation, content iden- tication and retrieval, in-band captioning, etc.) in which data- hiding plays (or has the potential to play) a very important role. Some of these applications involve the presence of an adversary attempting to disrupt reliable communication of the information of interest to the receiver. In particular, it has been observed that simple desynchronization operations (e.g., scaling, ampli- tude modulation, global or locally varying shifts (warping), l- tering, gamma correction, geometric (spatial) transformations such as rotation, zooming, etc.) can have a catastrophic impact on the performance of the decoder [1]–[4], usually measured Manuscript received April 15, 2010; revised January 06, 2011; accepted Feb- ruary 14, 2011. Date of publication March 17, 2011; date of current version August 17, 2011. This work was supported by NSF Grant CCF 07-29061. This work was presented in part at the International Conference on Image Processing, San Antonio, TX, in September 2007, and in Cairo, Egypt, in November 2009. The associate editor coordinating the review of this manuscript and approving it for publication was Dr. Fernando Perez-Gonzalez. S. Sadasivam was with the Department of Electrical and Computer Engi- neering, University of Illinois at Urbana-Champaign, Urbana, IL 61801 USA. He is now with Qualcomm Corporate R&D, San Diego, CA 92121 USA (e-mail: [email protected]; [email protected]). P. Moulin and T. P. Coleman are with the Department of Electrical and Computer Engineering, University of Illinois at Urbana-Champaign, Urbana, IL 61801 USA (e-mail: [email protected]; [email protected]). Color versions of one or more of the gures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identier 10.1109/TIFS.2011.2129511 via the probability of correctly decoding hidden data (i.e., the watermark). Also, the decoder need not, in general, have access to the original unmarked data, a scenario commonly referred to as blind data-hiding [5]. Good performance can theoretically be obtained using binning schemes [5], [6] such as quantiza- tion index modulation (QIM) and spread transform dither mod- ulation (STDM), but those schemes appear to be brittle against desynchronization operations, as evidenced by a review of the literature. This challenge is to date, one of the most difcult, and hence, least resolved problems in the eld. Broadly, three types of solutions have been proposed in the literature to address the desynchronization problem: embed- ding watermarks in an appropriate desynchronization invariant domain [4], [7]–[11], embedding pilots (synchronization se- quences) to help with inverting the attack(s) [12]–[18], and employing joint estimators-decoders that decode the water- mark and estimate the desynchronization attack parameters simultaneously [1]–[3], [19]–[21]. With the exception of [9] in a noise-free scenario, most invariant-based approaches are tailored to handling simple (e.g., pure scaling or pure shift) attacks, and so they offer little, or even no insight into handling other complex scenarios. Pilots are not information-bearing; while convenient, they reduce the embedding efciency and are theoretically suboptimal [22]. A theoretically superior approach is to design a code that lends itself to resynchronization, without wasting resources in communicating training sequences that are not information-bearing [16], [17], [23]. As an example of this approach, some of the best results to date for the blind embedding problem have been obtained by Balado et al. [1]. They explore the use of the expectation-max- imization (EM) algorithm for simultaneously decoding mes- sages and estimating scale and delay parameters. In more recent work [21], they explored the use of phase-locked loops as an al- ternative to the EM algorithm. Unfortunately poor performance is obtained when the desynchronization is moderate or large. An intriguing fact, however, is that the limited success of blind watermark decoders in combating desynchronization attacks can be attributed to suboptimal design rather than some fundamental limitation. Indeed, our earlier work presented conditions which guarantee that desynchronization can be dealt with satisfactorily [24]–[26]. More precisely, under certain con- ditions, it has been established that the joint estimator-decoder discussed above performs as well (with respect to decoding error exponent) as a hypothetical coherent decoder, assumed to have perfect knowledge of the attack [24], [25] (or in other words, under certain conditions, universal decoders exist for the desynchronization problem). Still, favorable optimality properties notwithstanding, the practicality of estimator-de- coders remained a concern due to the need for searches over a possibly very large parameter space [26]. 1556-6013/$26.00 © 2011 IEEE

894 IEEE TRANSACTIONS ON INFORMATION …moulin/Papers/TIFS-2011-shankar.pdf · 894 IEEE TRANSACTIONS ON ... ruary 14, 2011. Date of publication March 17, 2011; date of current

Embed Size (px)

Citation preview

894 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 3, SEPTEMBER 2011

A Message-Passing Approach to CombatingDesynchronization Attacks

Shankar Sadasivam, Student Member, IEEE, Pierre Moulin, Fellow, IEEE, and Todd P. Coleman, Member, IEEE

Abstract—We propose a new paradigm for blind watermarkdecoding in the presence of desynchronization attacks. EmployingForney-style factor graphs to model the watermarking system,we cast the blind watermark decoding problem as a probabilisticinference problem on a graph, and solve it via message-passing.We study a wide range of moderate to strong attacks includingscaling, amplitude modulation, fractional shift, arbitrary linearand shift-invariant filtering, and blockwise filtering, and showthat the graph-based iterative decoders perform almost as wellas if they had exact knowledge of the desynchronization attackparameters. Other desirable features of the graph-based decodersinclude the flexibility to adapt to other types of attacks and theability to cope with the “curse of dimensionality” problem thatseemingly results when the desynchronization parameter spacehas high dimensionality. These properties are unlike most blindwatermark decoders proposed to date.

Index Terms—Blind watermark decoding, data hiding, desyn-chronization attacks, Forney factor graphs, graphicalmodels, jointestimator-detector, Markov random fields, message passing, quan-tization index modulation (QIM).

I. INTRODUCTION

T HE advent of the Internet and other public informationsharing networks has given rise to a multitude of appli-

cations (e.g., copyright protection for digital media, content au-thentication, media forensics, database annotation, content iden-tification and retrieval, in-band captioning, etc.) in which data-hiding plays (or has the potential to play) a very important role.Some of these applications involve the presence of an adversaryattempting to disrupt reliable communication of the informationof interest to the receiver. In particular, it has been observedthat simple desynchronization operations (e.g., scaling, ampli-tude modulation, global or locally varying shifts (warping), fil-tering, gamma correction, geometric (spatial) transformationssuch as rotation, zooming, etc.) can have a catastrophic impacton the performance of the decoder [1]–[4], usually measured

Manuscript received April 15, 2010; revised January 06, 2011; accepted Feb-ruary 14, 2011. Date of publication March 17, 2011; date of current versionAugust 17, 2011. This work was supported by NSF Grant CCF 07-29061. Thiswork was presented in part at the International Conference on Image Processing,San Antonio, TX, in September 2007, and in Cairo, Egypt, in November 2009.The associate editor coordinating the review of this manuscript and approvingit for publication was Dr. Fernando Perez-Gonzalez.S. Sadasivam was with the Department of Electrical and Computer Engi-

neering, University of Illinois at Urbana-Champaign, Urbana, IL 61801 USA.He is nowwith QualcommCorporate R&D, SanDiego, CA 92121USA (e-mail:[email protected]; [email protected]).P. Moulin and T. P. Coleman are with the Department of Electrical and

Computer Engineering, University of Illinois at Urbana-Champaign, Urbana,IL 61801 USA (e-mail: [email protected]; [email protected]).Color versions of one or more of the figures in this paper are available online

at http://ieeexplore.ieee.org.Digital Object Identifier 10.1109/TIFS.2011.2129511

via the probability of correctly decoding hidden data (i.e., thewatermark). Also, the decoder need not, in general, have accessto the original unmarked data, a scenario commonly referred toas blind data-hiding [5]. Good performance can theoreticallybe obtained using binning schemes [5], [6] such as quantiza-tion index modulation (QIM) and spread transform dither mod-ulation (STDM), but those schemes appear to be brittle againstdesynchronization operations, as evidenced by a review of theliterature. This challenge is to date, one of the most difficult, andhence, least resolved problems in the field.Broadly, three types of solutions have been proposed in the

literature to address the desynchronization problem: embed-ding watermarks in an appropriate desynchronization invariantdomain [4], [7]–[11], embedding pilots (synchronization se-quences) to help with inverting the attack(s) [12]–[18], andemploying joint estimators-decoders that decode the water-mark and estimate the desynchronization attack parameterssimultaneously [1]–[3], [19]–[21]. With the exception of [9]in a noise-free scenario, most invariant-based approaches aretailored to handling simple (e.g., pure scaling or pure shift)attacks, and so they offer little, or even no insight into handlingother complex scenarios. Pilots are not information-bearing;while convenient, they reduce the embedding efficiency and aretheoretically suboptimal [22]. A theoretically superior approachis to design a code that lends itself to resynchronization, withoutwasting resources in communicating training sequences thatare not information-bearing [16], [17], [23].As an example of this approach, some of the best results to

date for the blind embedding problem have been obtained byBalado et al. [1]. They explore the use of the expectation-max-imization (EM) algorithm for simultaneously decoding mes-sages and estimating scale and delay parameters. In more recentwork [21], they explored the use of phase-locked loops as an al-ternative to the EM algorithm. Unfortunately poor performanceis obtained when the desynchronization is moderate or large.An intriguing fact, however, is that the limited success of

blind watermark decoders in combating desynchronizationattacks can be attributed to suboptimal design rather than somefundamental limitation. Indeed, our earlier work presentedconditions which guarantee that desynchronization can be dealtwith satisfactorily [24]–[26]. More precisely, under certain con-ditions, it has been established that the joint estimator-decoderdiscussed above performs as well (with respect to decodingerror exponent) as a hypothetical coherent decoder, assumedto have perfect knowledge of the attack [24], [25] (or in otherwords, under certain conditions, universal decoders exist forthe desynchronization problem). Still, favorable optimalityproperties notwithstanding, the practicality of estimator-de-coders remained a concern due to the need for searches over apossibly very large parameter space [26].

1556-6013/$26.00 © 2011 IEEE

SADASIVAM et al.: MESSAGE-PASSING APPROACH TO COMBATING DESYNCHRONIZATION ATTACKS 895

Fig. 1. Communication model for watermarking.

This paper, in an attempt to address this question, introducesa practical computational framework for decoding in the pres-ence of desynchronization attacks using graphical models forthe host signal, the watermarking code, and the attack channel.The reader is referred to the books by Lauritzen [27], Pearl [28],and Frey [29] as well as the articles [30]–[32] for a general intro-duction to graphical models. These models appear to be particu-larly appropriate for watermarking of media signals because theunderlying probabilistic models are local, and inference prob-lems such as watermark decoding can be solved using iterativebelief propagation (a.k.a. message-passing) algorithms. We willillustrate our approach with numerical results for various mod-erate to strong intensity scaling, amplitude modulation, frac-tional shift, and other (global and blockwise) linear and shift-in-variant (LSI) filtering attacks.The rest of the paper is organized as follows. We provide the

system model and motivate the problem further in Section II.Graphical models are introduced in Section III and the proposeddecoding algorithm is presented in detail in Section IV. Ex-perimental results are reported in Section V. We conclude inSections VI and VII with a discussion highlighting potential fu-ture work, and some open questions.

Notation

Throughout the paper, both random variables and their real-izations are denoted by lowercase letters; the context will makethe notation clear on all occasions. Boldface letters denote se-quences of real numbers, e.g., , where is a finite

set. We denote by the Euclidean norm of .

The probability density function (pdf) of is , and that ofconditioned on is . The Gaussian distribution with

mean and variance is denoted by . The Dirac im-pulse is denoted by .

II. SYSTEM MODEL

A fairly general communication model for watermark de-coding is depicted in Fig. 1. A length- message, such as a dig-ital signature, is embeddedin a multidimensional real valued host sequence, aided by side information shared with the receiver.

The signal after embedding is denoted by andreferred to as the watermarked (or simply the marked) signal. Insome cases, no embedding takes place (say when ), andthe encoding function simply reproduces . The receiver doesnot observe directly. It only observes the output of an inse-cure channel modeled by a conditional distribution . Forinstance could be a simple memoryless channel, suchas an additive white Gaussian noise channel. But the insecurechannel need not be memoryless or even causal (see the exam-ples of Section V).

The encoder is assumed to act blockwise on the host: the em-bedding function factors into embedding functionsthat act independently on nonoverlapping -dimensional hostsubblocks, where . More precisely, the host, themarked sequence and the key may be partitioned as

(1)

(2)

(3)

where

(4)

The function in (4) is the scalar DC-QIM embedding func-tion acting on each component of , i.e.,

(5)

where ; ; is the th compo-nent of ; is the distortion-compensation (Costa)parameter; is theshifted quantizer associated with bit ; and isthe prototype scalar uniform quantizer with step size . As im-plied by (5), the same bit is embedded in each componentof , thereby inducing a rate repetition code withineach subblock . The host-to-watermark ratio (HWR) of theembedding process is given by

(6)

where is the watermark power.1 The setup ofFig. 1 is applicable both to authentication problems (in whichcase the embedding rate is typically small) and to data hiding(where is large).The receiver has access to the received signal and side in-

formation and produces an estimate of . We assume thatthe receiver knows the type of desynchronization attack, andthe statistical models of the host and the attack, but not nec-essarily the model parameters. The side information may be acryptographic key, but can also be used to convey informationabout to the receiver. A blind receiver is not given access tothe host . For the purposes of this paper, we assume is inde-pendent of and, as diagrammed in Fig. 2, model the insecurechannel as the cascade of an additive Gaussian noise channelfollowed by a desynchronization transformation parameterizedby . In the simplest setting, the dimensionality of does not de-pend on the signal size ; more generally, may be a sequence

, that exhibits temporal coherence properties,i.e., it is slowly varying, with occasional jumps. A hypotheticaldecoder that is informed of the values of these parameters is acoherent decoder; a decoder that does not is a noncoherent de-coder. We shall be interested in constructing good noncoherentdecoders, and in estimating the noncoherent decoding penalty.

1For a wide range of host signals, the dynamic range of the host is muchlarger than the quantization step size , enabling us to approximate the water-mark embedding distortion per sample to be uniformly distributed in the interval

.

896 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 3, SEPTEMBER 2011

Fig. 2. Model for desynchronization attacks.

III. GRAPHICAL MODELS

A particularly exciting opportunity in the watermark de-coding problem is the possibility to combine the Bayesianparadigm for optimal decision making with inference tech-niques on graphical models [28]–[30]. For instance, classicalKalman filtering (or Kalman smoothing) may be interpretedas an instance of probabilistic inference in a special Gaussiangraphical model. The use of Bayesian recursive filters in lieuof Kalman filters is a natural extension to this technique tononlinear state-space models.The opportunity of graphical models in the context of water-

mark decoding consists of a way to embed a message with someredundancy in a host which can exhibit long range dependenciesamong the signal components. The final estimation can then beorganized in such a way that the Bayesian estimator and an esti-mator for the data redundancy iteratively solve the probabilisticinference problem. This iterative approach to estimating data innoisy environments has been very successful in data transmis-sion and is dubbed the “turbo” principle. In our context, we wantto fully exploit the power of this approach even in hostile andvery difficult environments as would be constituted by an activeattack on the decoding scheme. As such, our approach is mo-tivated by work on the probability propagation (sum-product)algorithm for iteratively decoding error-correcting codes suchas turbo codes [29]. Until recently, optimal decoding even onGaussian channels was thought to be intractable. However, itturns out that probability propagation in a graphical model de-scribing the code solves the problem for practical purposes.The power of this approach is even more apparent in higher

(e.g., two) dimensional data sets as they naturally appear in wa-termarking of images or video sequences. In other words, the“curse of dimensionality” is a problem that is efficiently ad-dressed in graphical models. In fact, one can argue that graph-ical models were specifically invented to cope with inferenceproblems in high dimensional setups. In this case, a graphicalmodel may be used to estimate a distortion or alteration in theproperties of the host data. The essential trick is to find a decom-position of the posterior probability density function such thatestimation and hypothesis testing has a tractable structure. Thegeneric problem in our problem setup would be one where theadversary has possible transformations (the first one beingtime warping, possibly using a multiscale representation for thewarping process; the second one might be an amplitude modu-lation, again using a multiscale representation for the envelope,etc.). The key to coping with the dimensionality of such a modelis to find (or model) a factorization of the probability density asis, e.g., done in factor graphs [29], [30]. Once this is done, pow-erful inference algorithms such a the sum-product algorithm caneffectively construct excellent approximations to the global ob-jective function [29], [30], and together with a powerful, inter-leaved code that protects the embedded data, we can obtain anefficient scheme for data embedding. Moreover such a scheme

is computationally feasible due to its inherent divide-and-con-quer philosophy, thereby making parallelized implementationapproaches feasible. This approach has revolutionized much ofcommunications in the last few years andwe believe that it holdsthe potential to give similarly significant and practical improve-ments for the watermark decoding problem; experimental evi-dence presented later on in this paper will add further credenceto this belief. We will study the simple (and yet powerful) mes-sage passing algorithm in Section IV.

IV. MESSAGE PASSING DECODING ALGORITHM

The application of the message passing algorithm to find anapproximate maximizer (or even better, an exact maximizer,e.g., if the graph is a tree) to the desired objective function (here

) is a three-step procedure:1) Graph: Write down the Forney-style factor graph (FFG)corresponding to the system at hand [30], [33]. To do this,we need to first factorize the joint probability distributionof all variables involved in the system using the appropriateconditional probabilities, thus resulting in several factorsthat typically depend on a rather small subset (e.g., cardi-nality 2 or 3) of all variables in the system. The construc-tion of the corresponding FFG is then straightforward, andfollows the following rules:a) a unique node for every factor;b) a unique edge (connecting two nodes) or half edge(connected to only one node) for every variable;

c) the node representing some factor is connected withthe edge (or half edge) representing some variableif and only if is a function of .

This is best explained through an example. For ease of ex-position, let us momentarily assume that the desynchro-nization attack in Fig. 2 does nothing (i.e., ). Fur-ther, let us assume that all signals are one-dimensional, theembedding rate is , and we use the followingMarkov random field based pdf to model the host :

(7)

where is theGaussian pdf, are constants, and the index

refers to the host sample located to the east (right)of (cycle around if necessary since we assume periodicextensions of the images). Here, the joint pdf of all systemvariables factorizes as follows:

(8)

and the factor graph corresponding to the joint pdf ofis given in Fig. 3. The “ ” and “ ” blocks

are special factor nodes representing the zero-sum andequality constraint nodes, respectively, and their roles are

SADASIVAM et al.: MESSAGE-PASSING APPROACH TO COMBATING DESYNCHRONIZATION ATTACKS 897

Fig. 3. Factor graph toy example for Section IV. Note that edges marked withdouble arrows are connected to each other, thus creating loopy graph modelinghost statistics.

Fig. 4. Message update at factor node.

explained in [33, Sec. 2]. For the sake of brevity, we omitthe second argument to in the graph.

2) Schedule: Pick a schedule according to which the mes-sages corresponding to each edge on the graph will beupdated. There are two messages corresponding to eachedge—we shall refer to these as the forward and backwardmessages. The forward messages are updated in the “for-ward pass” of the message updating step, and similarly forthe backward. For all of our experiments, we stick to the“logical” forward schedule as suggested by the block di-agram in Fig. 1—left to right, i.e., in Fig. 3, the forwardmessages are propagated from the host level to the markedsignal level, and then further downwards. The whole for-ward sequence of propagation is then retraced to completethe “backward pass,” thereby completing one iteration ofa full message update.

3) Iterate: This one is the message updating step, and israther straightforward. All messages, forward and back-ward, corresponding to every edge in the graph are ini-tialized to 1 in the beginning. Thereafter, in accordancewith the chosen schedule, update of an outgoing message

at an arbitrary node with factor [i.e., couldbe any of the individual factors in (8)] and incoming mes-sages (see Fig. 4) takes thefollowing general form2:

(9)

2Note that the factorization process, as done in (8), typically results in factorscontaining only a small number of variables, thereby making the computationin (9) tractable.

This step is, therefore, purely about updating messages ateach node according to the schedule chosen above, untilsome convergence criterion is met.3 In this paper, since weare interested in decoding the watermark, we iterate untilthe decoder’s output stabilizes for iterations, where isa small number ( ) chosen a priori. Choosingwill suffice if the underlying FFG is nonloopy, but this istypically never the case in our problems of interest.Note that in the special case when corresponds to anequality constraint node, (9) simplifies to

(10)

Another frequently encountered scenario is when is thezero-sum constraint node and . Here, (9) simplifiesto a simple convolution

(11)

A remark on the actual computation of the integral involvingcontinuous valued variables in (9)—several ways to do thisinclude simple discretization of continuous valued messages,parametric updates, and particle methods wherein messages arerepresented as lists of samples. A detailed summary of the var-ious methods can be found in [34]. In this paper, all messagesare computed in a discretized fashion, excepting when explicitparametric updates are possible (more details regarding this inSection V).

V. EXPERIMENTAL RESULTS

All our experiments have been done on two-dimensional(256 256) signals, including synthetic and photographic im-ages. We model the host as a Gaussian Markovrandom field (MRF) with first order neighborhoods as follows:

(12)

where again denotes the pixel index set, , as definedearlier, is the Gaussian pdf, and denote the pixel in-tensities at location , one pixel to the east, and one north of(directly above) , respectively (cycle around if necessary).4

is the normalization factor for the pdf. We will also stick toan information embedding rate of (one bit is em-bedded into each 4 2 subblock of the host) throughout as ithelps with making comparisons from various experiments. Wewill focus on five types of desynchronization attack models de-scribed below:

(M1) Amplitude scaling: , where in our experi-ments, is a Gaussian random variable with mean 1 and

3These algorithms are generally known to converge to local extrema, andconvergence to globally optimum solutions is difficult to guarantee, especiallywhen the underlying graph is heavily loopy (as is the case in our problems ofinterest), and/or when the messages are rather irregular, e.g., multimodal (again,as is the case in our problems of interest).4If the model parameters are not known a priori at the receiver, they should

be estimated. We discuss this in Sections V-B and V-C.

898 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 3, SEPTEMBER 2011

Fig. 5. Left: A dependency graph for the full probabilistic model corresponding to (M2), Section V. For clarity, we only show a 4 2 cross-section of the graphinto which one bit is embedded. The embedding rate is . Right: Factor graph (Forney-style) corresponding to the “ -plane” in the dependency graph.A few of the factor nodes are labeled, for the sake of exposition. Due to space constraints, we omit the second argument to in the diagram. For added clarity,we also show the full factor graph skeleton for the AM attack case in Fig. 6.

standard deviation 0.2. Alternatively, we may havein which case the statistics of have to be mod-

eled appropriately. Though seemingly simple, this problemhas earned the attention of many researchers in the past,and continues to remain a challenging one especially whenthe scaling intensities are far away from unity.(M2) Amplitude modulation (AM): The factor graphcorresponding to this model is shown in Fig. 5. This can bethought of as a generalization of (M1) where the scalingparameter varies spatially. Letbe a partition (e.g., rectangular tiling) of the pixel domain. The AM field is parameterized by a collection of param-eters , and we model this as a Gaussian Markov randomfield with unit (or in general, some known) mean andfirst-order neighborhoods, acting independently acrossnonoverlapping subblocks of the host. The dependencieswithin each subblock are described by

(13)

to , where is the amplitude modulationfield acting on , , and all other quantities, in-cluding the (blockwise) cycling around effect, are definedsimilarly as in (12). For example, the scaling attack on theentire image [as in (M1)] corresponds to the simple tiling

and the limiting case of . Any other ar-bitrary tiling with will correspond to a piecewiseconstant AM attack. Introducing additional dependenciesin the AM field across subblocks can only make the infer-ence problem easier (but possibly with an added compu-tational cost) as this effectively decreases the number ofindependent parameters to estimate. Similarly, decreasingthe information embedding rate can also only make the in-ference task easier.In this paper, we will assume that the AM field acts inde-pendently on 8 8 blocks of the host. In the limiting case

Fig. 6. Skeletal representation of the Forney factor graph corresponding to(M2), amplitude modulation attacks. The meshes labeled “host-MRF” and“ -MRF” are constructed in a manner similar to the left graph of Fig. 5 and arenot shown in detail due to space constraints. Vertical branches, similar to theone depicted above, exist between all corresponding (vertically aligned) nodeson the “host-MRF” and “ -MRF” meshes. Again, we omit drawing those toreduce clutter.

of , this constitutes an AM attack with 32 32 inde-pendent parameters. Though this may not constitute a typ-ical “smooth” desynchronization attack, we report resultsfor this case to illustrate the power of our approach. Thesame algorithm can, however, be applied to smoother (andtypically more commonly encountered) attacks, as will besoon seen in Section V-B.(M3) LSI filtering: , where denotes linearconvolution and is an arbitrary 2-D LSI filter parame-terized by a random variable whose statistics are assumedto be known to the receiver. For LSI filtering attacks, weperform the watermark embedding in the Fourier domain,while ensuring that the marked signal remains real valued.

SADASIVAM et al.: MESSAGE-PASSING APPROACH TO COMBATING DESYNCHRONIZATION ATTACKS 899

The choice of Fourier domain is motivated by the desire toinduce a factor graph that has as few loops as possible (alsosee comments in Section VI). This embedding procedureis explained in detail in [26] (Algorithm 1). For illustrationpurposes, in this paper, we will use the filter obtainedby cascading the zero-phase “exponential” 1-D (low pass)filter applied in both directions

(14)

where5 , , and IDFTdenotes the inverse DFT. The constant is small, say ,and is employed to prevent numerical instabilities duringattack inversion.(M4) Fractional (spatial) shift: This can be seen as a spe-cial case of (M3), but as in many other watermarking pa-pers, we shall give it some special attention. In the 1-Dcase, for integer shift . If is not aninteger

(15)

is a resampled version of the shifted, interpolated signal ,where are the taps of the interpolation filter (wouldbe a sinc for bandlimited interpolation; we will use thebicubic kernel). If is a constant, (15) is a particular LSIfilter. If varies slowly over space (as is the case withwarping attacks), (15) is a linear shift-variant filter. Thismodel can be extended to images by applying the same1-D filter along each direction.(M5) Blockwise filtering and shift: The attack is assumedto act independently on 8 8 blocks of the host; this meansa total of different (and possibly correlated) values offor a 256 256 host. We use the same models for LSI fil-tering and shift as in (M3) and (M4), respectively, the onlydifference being that the attack parameter now varies spa-tially. The 32 32 field is modeled to be drawn from aGaussian Markov random field as in (M2) with parameters, , and .

Joint estimation of the attack parameters and the embedded bitsis performed independently on nonoverlapping 8 8 subblocksof the host, and this is found to be sufficient to yield good de-coding performance. Yet, this is a suboptimal approach becausethe observed image samples are correlated due to the dependen-cies introduced by the host. Using more samples (e.g., the entirehost image) for performing the joint estimation could improvedecoding performance, but at the significant cost of complexityand speed.

A. Synthetic Host Signals

Here, we present some experimental results on syn-thetic host signals. A 256 256 host with and

, is drawn according to (12) by Gibbs sampling[35]. Watermarking is done as described earlier for variousattacks, (M1) through (M5). The distortion compensationparameter is chosen in agreement with Eggers’ value, i.e.,

, which is nearly optimal in thesense of maximizing rate of reliable communication over an

5Note that is merely a superscript index in , but an exponent in .

Fig. 7. Numerical results for (M1)—Amplitude scaling, with synthetic host,and scaling parameter . HWR dB.

Fig. 8. Numerical results for (M3)—LSI filtering with an “exponential” lowpass filter, and synthetic host. HWR dB.

additive white Gaussian noise channel [18]. The HWR [see (6)]is 25 dB, and the watermark-to-noise ratio ( )is varied from 2 to 1 dB. Here, denotes the variance ofadditive Gaussian noise . Independent bits are embedded in4 2 blocks of the host. As explained earlier, the same bit isembedded in each component (pixel) of the subblock, therebyinducing a simple rate 1/8 repetition error correction codewithin each 4 2 subblock of the host. We evaluate the biterror rate

(16)

for the estimator-decoder described in Section IV, and com-pare it with that of the coherent decoder (denoted by ) thatknows . Numerical results for various values of model param-eters, and for each of the attack models (M1) through (M5)are given in Figs. 7, 8, and 9, and Tables I and II. The per-formance of the noncoherent decoder is seen to be almost as

900 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 3, SEPTEMBER 2011

Fig. 9. Numerical results for (M4)—Fractional shift by , with synthetic host.HWR dB.

TABLE INUMERICAL RESULTS FOR (M2)—AMPLITUDE MODULATION BY

GAUSS–MARKOV AMPLITUDE FIELD . HWR dB, WNR dB

TABLE IINUMERICAL RESULTS FOR (M5)—BLOCKWISE FILTERING (ROWS 1, 2, 3, 4),

BLOCKWISE SHIFT (ROWS 5, 6, 7, 8). HWR dB, WNR dB

good as that of the coherent one in most experiments, for a widerange of attack intensities, “mild” to “strong.” To the best ofour knowledge, no previous work has demonstrated such re-silience to attacks with such strong intensities. In [1], where theauthors report results for scaling and fractional shift attacks, thedecoder’s performance begins to deteriorate rapidly outside avery narrow scaling range of (0.9,1.1). A similar behavior canbe seen in [11] for scaling intensities above 1.1. In contrast, ourdecoders nearly match the performance of the coherent decodereven when the scaling intensities are far away from unity. Sim-ilarly, for the fractional shift attacks analyzed in [1], the errorprobability numbers quickly rise up to 0.5 for shifts as low as0.2; in contrast, the graph-based decoder is seen to perform verywell for shifts even as high as 2.5. Similar comparisons hold forother types of attacks as well.Finally, it is also illustrative to compare the decoding per-

formance of our scheme with that of “Rational Dither Modula-

Fig. 10. Numerical results for (M1)—Comparison of our decoder with that of[4]. HWR dB, bit sample. The parameter denotes the memorylength in RDM (see [4] for more details).

tion” or RDM [4], a recently proposed modification of the stan-dard QIM encoder to specifically combat scaling attacks. Fig. 10plots the performance of our scheme against that of the coherentdecoder, and the encoder–decoder setup of RDM. Simulationsare performed on a one-dimensional host consisting of 256 sam-ples, drawn from a Gaussian MRF with parameters ,

, , HWR dB, WNR dB dB .The embedding rate is 1 bit per sample, i.e., no error correctioncode is employed. As one can note from Fig. 10, our systemoutperforms RDM uniformly over this range of WNRs, whichis encouraging considering that our encoder is generic and wasnot tailored to handle scaling attacks.

B. Lena

The experiments of Section V-A were repeated on a256 256 image of Lena. We perform watermarking, as de-scribed in earlier sections, but in the wavelet domain. We usethe difference between the original image and the low-pass ap-proximation version obtained from the 16 16 approximationcoefficients of a four-level Daubechies-4 wavelet transform asinput to marking algorithms described in earlier sections. Asbefore, the HWR is maintained at 25 dB, and theWNR is variedfrom 2 to 1 dB. The parameters and for modeling thedifference image as in (12) are obtained as pseudomaximumlikelihood estimates (see the Appendix), and shared with thedecoder. As we will see later in Section V-C, accurate estimatesof these parameters are not really necessary. Numerical resultsfor various values of model parameters, and for each of theattack models (M1) through (M5) are given in Figs. 11, 12, and13, and Tables I and II.The images of Figs. 14 and 15 illustrate the intensity of var-

ious attacks. As mentioned earlier, all the numbers reported inTable I correspond to anMRF acting independently on nonover-lapping 8 8 subblocks of Lena [Fig. 14(b)]. However, pri-marily to serve as a visual aid, we also show images corre-sponding to a 64 64 tiling as well [Fig. 14(c)]. It may be notedthat the latter is in fact an easier inference problem, but our al-

SADASIVAM et al.: MESSAGE-PASSING APPROACH TO COMBATING DESYNCHRONIZATION ATTACKS 901

Fig. 11. Numerical results for (M1)—Amplitude scaling, with Lena, andscaling parameter . HWR dB.

Fig. 12. Numerical results for (M3)—LSI filtering with an “exponential” lowpass filter, and Lena. HWR dB.

gorithm is capable of producing near-coherent decoding evenon the former. Also shown [in Fig. 14(d)] is an example of a“smooth” AM attack, for which the same algorithm can be ap-plied blindly, so long as the AM field stays roughly a constantover 8 8 subblocks of the image [as is the case in Fig. 14(d)].

C. Robustness to Host Modeling Mismatch

Here, we investigate the robustness of our algorithm to mis-matches in host modeling. This is an important issue, especiallywhen working with natural images, as it may not be feasible (orpractical) to obtain an accurate characterization of the under-lying statistics of the host image.We repeat the experiments of Section V-A, using the AM

model from (M2), but with a twist. Host samples are drawn froma mismatched model of (12), with replaced by ,respectively. The performance of the mismatched decoder is re-ported in Table III. The results show that the decoder is capable

Fig. 13. Numerical results for (M4)—Fractional shift by , with Lena. HWRdB.

Fig. 14. Various desynchronized versions of Lena. It may be noted that no noisehas been added to the images above (i.e., ). Also see Fig. 15. (a) OriginalLena. (b) For Table I, Row 2. (c) AM attack #2. (d) AM attack #3.

Fig. 15. Various desynchronized versions of Lena. As in Fig. 14, no noise hasbeen added to the images above (i.e., ). (a) For M3, . (b) ForM3, . (c) For M3, . (d) Blockwise filtering.

of tolerating host modeling mismatches to a significant extent,a property that will be useful when working with natural and

902 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 3, SEPTEMBER 2011

TABLE IIINUMERICAL RESULTS FOR SECTION V-C USING THE AM ATTACK MODELOF (M2). , FOR A CORRECTLY MATCHED DECODER, ANDHWR dB, WNR dB. HERE,

CAPTURES THE EXTENT OF MODEL MISMATCH

photographic images as it may not be possible to get accuratemodeling parameter estimates for the same.We conclude this section with a note on running times for our

decoding algorithm. All experiments were performed on aWin-dows machine with 32-bit OS, 2.67-GHz quad-core processors,and 4GBRAM. The code was not fine-tuned for parallel compu-tation and takes anywhere between 10–20 min to decode a rate1/8 message (watermark) from a 256 256 host, with .

VI. DISCUSSION, CAVEATS

First, as seen in Section V, one of the most striking positivesof our approach is the increased resilience to desynchroniza-tion attacks. Explicit comparisons with results from [1] haverevealed increased resilience ranges of up to 10 in the case ofscaling and even more for pure shift attacks. Another importantpower of graph-based decoders is their ability to handle highdimensional attacks. For example, in the AM experiments(M2), we saw that noncoherent decoding was feasible evenwhen faced with the challenging task of estimating inde-pendent attack parameters. This is important for two reasons:1) such a decoding approach is significantly more efficient(w.r.t. algorithm execution time) compared to a brute forcesearch [26]; and 2) this property sets it apart from the otherdecoders proposed to date—for example, the decoder of [1]uses host samples to estimate a single unknownparameter. Thus, the “divide and conquer” iterative estimationapproach has its clear benefits.Secondly, we saw in Section V-C that decoding performance

is good even if the receiver does not know exact host signalstatistics; in other words, crude host modeling will suffice anddoes not influence the decoding by much. However, the sameis not necessarily true of attack modeling. In all of our reportedexperiments, we have assumed that the receiver is fully cog-nizant of attack parameter statistics. If this was not the case, thereceiver faces a problem in the sense that the lack of prior infor-mation about could result in increased time to convergence.However, so long as we have a sufficiently large number of ob-served signal samples, it is not absolutely critical that the statis-tical modeling of should be exact. For instance, in (M1) whereis the scaling parameter, we still obtain good results if was

uniformly distributed over , but experiments modeled it tobe drawn from a Gaussian distribution, say . This isnot surprising, as the influence of the prior vanishes with an in-creasing number of observed samples in any estimation problem(subject to regularity conditions). To summarize, exact knowl-edge of parameters describing the statistics of is not absolutely

Fig. 16. Spatial domain approach to handling attacks of type (M3). For sim-plicity, we only illustrate the 1-D case here. Messy factors, those with degreemore than 3 or 4, significantly increase the computational complexity of dis-cretized messages’ updates.

necessary, but we have observed it does help in terms of con-vergence speed, especially when the number of observed signalsamples per number of attack parameters is moderate.And finally, an important caveat—tractable factors and graph

loops. As is already evident, loops are unavoidable in (almost)all the systems we consider. However, care needs to be takento avoid loops wherever possible, as such intelligent graph con-structions do seem to play a vital role in influencing the con-vergence properties of the message passing algorithm. Whileloops are best avoided wherever possible, in general, graphswith longer loops seem to offer a more conducive platform forconvergence as opposed to one with many short loops. Care alsoneeds to be taken to design graphs that avoid messy factors,wherever possible. As an example, one can equivalently imple-ment the LSI filter of (M3) in the spatial domain instead of thefrequency domain. However, the former approach yields factorsthat are much more complicated than what we saw in the latterapproach, and this might lead to computation of very hard mes-sage update steps. Further, as illustrated in Fig. 16, the spatialdomain treatment of the problem will result in a graph that hasmany more loops than is necessary (the number of loops scalessteeply with the number of nonzero filter taps), and based onour experiments, convergence does not happen in a reasonableamount of time (in fact, we cannot guarantee that the messageswill eventually stabilize). Perhaps better convergence could beobtained if we chose to perform the belief propagation updatesdifferently instead of discretized messages; for example, non-parametric message passing could be used. We have not ex-plored such options in this paper.

VII. FUTURE WORK

The results presented in this paper are encouraging andsuggest additional problems to explore. Of these, perhaps the

SADASIVAM et al.: MESSAGE-PASSING APPROACH TO COMBATING DESYNCHRONIZATION ATTACKS 903

Fig. 17. More powerful alternatives to repetition codes (such as LDPC codes)allow for lower probabilities of decoding error. Due to space constraints, weomit showing the remainder of the graph with the host, attack model, etc. Notethat the “ ” blocks above are similar to the zero-sum constraint nodes intro-duced in Section IV, the only difference being that the addition is done modulotwo. Message updates for this section of the graph can typically be processed inbatches, i.e., all messages corresponding to the upper set of nodes in one step,followed by the lower ones. More details can be found in [33] and [36].

most compelling would be to investigate the resilience of thisfamily of decoders to geometric attacks such as zooming,spatial warping, and rotation. In principle, it is straightforwardto construct a (potentially naïve) decoder that attempts to per-form probabilistic inference under geometric transformationsof the host. However, it is not clear what would be the bestapproach to do so—specifically, the way to go about handling“messy” loops and factors is not immediately clear. Any sig-nificant breakthrough on that front is bound to project iterativegraph-based decoding strategies introduced in this work asa generic and powerful tool to cope with a remarkably widerange of desynchronization attack operations.Another avenue for exploration would be to tap the power of

message-passing-based decoders when the attack model is un-known. If we know that the attack channel has introduced oneamong a few possible transformations, we can perform anexhaustive search within the confines of possible parameter-izations of the channel. However, the problem is compoundedsignificantly if is large, or potentially even infinite. In suchcases, a better approachmight be to perform some preprocessingthat aims to learn the structure of the underlying graph basedon samples of the received signal. This is, however, beyond thescope of this work.Finally, while we use simple repetition codes for channel

coding in our setup, the decoder model proposed in Section IVoffers the potential to construct very efficient blind watermarkdecoders that incorporate, in the Bayesian inference setup, pow-erful error correcting codes (e.g., turbo or LDPC codes), whosedecoding is also done via belief propagation on an appropriatefactor graph (see Fig. 17). Such a decoder that would fully com-bine the power of graph-based desynchronization estimation(for a really wide range of attacks), and a powerful, interleavederror correcting code for achieving decoding error probabilitiesmuch lesser than what repetition codes are able to offer, wouldbe an eventual goal of this work.

APPENDIX

Here, we provide details about the estimation of MarkovRandom Field (MRF) parameters in (12). For convenience, wewill first rewrite (12) as follows:

(17)

where

(18)

An obvious choice for estimating the parameters andwould be the maximum-likelihood (ML) method, wherein

we may maximize the log likelihood function

(19)

(20)

over and . However, computation of the partitionfunction

(21)

involves a computationally prohibitive integral over all possibleconfigurations , which is typically impossible to calcu-late for all practical purposes as is usually large. The MLmethod can, therefore, not be implemented, and we resort to apseudo-ML approach that exploits the local characteristics ofthe MRF and yields good approximations to the estimates weseek.This is also known in the literature as the “coding method”

[37]. A coding is a set of sites which are conditionally indepen-dent given their own neighborhood. For instance, consider theMRF with first-order neighborhood of (18). By subsamplingaccording to a quincunx scheme, we obtain two codings andwhose elements are, respectively, circles and bullets in the

figure below.Pseudo ML Estimation of MRF Parameters:

............. . .

Based on the above codings, we can also now define configura-tions and . It is now easyto note that conditioned on , the joint probability distributionof takes the following elegant product form:

(22)

(23)

904 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 3, SEPTEMBER 2011

where ,denotes the locations immediately to the

east, west, north, and south of (or in short, the neighborhoodof ), and . We can now define a locallog-likelihood function

(24)

and obtain a computationally tractable optimization problem

(25)for which numerical solutions can be found. Further, wecan also obtain another set of estimates byswitching the roles of and . The final pseudo-ML estimatesof the MRF parameters are obtained as an average of the abovetwo estimates. Note that the estimates and

are highly correlated as the configurationsand are dependent. This procedure is quite popular due to itsimplementation efficiency, and also due to its nice theoreticalproperties, including convergence in probability to the trueparameter values as [37].If instead we had an MRF with second-order neighborhoods,

a similar procedure would be used, but with four codingsand defined below. Here, the samples of

defined over are conditionally independent given the otherthree codings, etc.

......

......

......

. . .

ACKNOWLEDGMENT

The authors are deeply indebted to the late Prof. R. Koetterfor playing a decisive role in shaping the initial ideas behindthis work. Thanks are also due to the anonymous reviewers foroffering valuable suggestions and comments.

REFERENCES[1] F. Balado, K. M. Whelan, G. C. M. Silvestre, and N. J. Hurley, “Joint

iterative decoding and estimation for side-informed data hiding,” IEEETrans. Signal Process., vol. 53, no. 10, pp. 4006–4019, Oct. 2005.

[2] R. L. Lagendijk and I. D. Shterev, “Estimation of attacker’s scale andnoise variance for QIM-DC watermark embedding,” in Proc. IEEE Int.Conf. Image Processing, Oct. 2004, vol. 1, pp. 24–27.

[3] I. D. Shterev and R. L. Lagendijk, “Amplitude scale estimation forquantization-based watermarking,” IEEE Trans. Signal Process., vol.54, no. 11, pp. 4146–4155, Nov. 2006.

[4] F. Perez-Gonzalez, C. Mosquera, M. Barni, and A. Abrardo, “Rationaldither modulation: A high-rate data-hiding method invariant to gainattacks,” IEEE Trans. Signal Process., vol. 53, no. 10, pp. 3960–3975,Oct. 2005.

[5] P. Moulin and R. Koetter, “Data-hiding codes,” Proc. IEEE, vol. 93,no. 12, pp. 2083–2126, Dec. 2005.

[6] B. Chen and G. W. Wornell, “Quantization index modulation: A classof provably good methods for digital watermarking and informationembedding,” IEEE Trans. Inf. Theory, vol. 47, no. 4, pp. 1423–1443,May 2001.

[7] M. Kutter, “Watermarking resisting to translation, rotation andscaling,” in Proc. SPIE, Boston, Nov. 1998, vol. 3528.

[8] J. J. ÓRuanaidh and T. Pun, “Rotation, scale and translation invariantspread spectrum digital image watermarking,” Signal Process., vol. 66,no. 3, pp. 303–317, May 1998.

[9] F. Perez-Gonzalez and C. Mosquera, “Quantization-based data hidingrobust to linear-time-invariant filtering,” IEEE Trans. Inf. ForensicsSecurity, vol. 3, no. 2, pp. 137–152, Jun. 2008.

[10] M. L. Miller, G. J. Doerr, and I. J. Cox, “Dirty-paper trellis codes forwatermarking,” in Proc. IEEE Int. Conf. Image Processing, 2002, vol.2, no. 2, pp. 129–132.

[11] M. L. Miller, G. J. Doerr, and I. J. Cox, “Applying informed coding andembedding to design a robust high-capacity watermark,” IEEE Trans.Image Process., vol. 13, no. 6, pp. 792–807, Jun. 2004.

[12] S. Pereira and T. Pun, “Robust template matching for affine resistantimage watermarks,” IEEE Trans. Image Process., vol. 9, no. 6, pp.1123–1129, Jun. 2000.

[13] C. Y. Lin, M. Wu, J. A. Bloom, I. J. Cox, M. L. Miller, and Y. M. Lui,“Rotation, scale, and translation resilient watermarking for images,”IEEE Trans. Image Process., vol. 10, no. 5, pp. 767–782, May 2001.

[14] M. Álvarez Rodríguez and F. Pérez-González, “Analysis of pilot-basedsynchronization algorithms for watermarking of still images,” SignalProcess., Image Commun., vol. 17, pp. 611–633, Sep. 2002.

[15] P. Moulin and A. Ivanović, “The Fisher information game for optimaldesign of synchronization patterns in blind watermarking,” in Proc.IEEE Int. Conf. Image Processing, Oct. 2001, vol. 2, pp. 550–553.

[16] P.Moulin, “Embedded-signal design for channel parameter estimation.Part I: Linear embedding,” in Proc. IEEE Statistical Signal ProcessingWorkshop, Sep. 2003, pp. 38–41.

[17] P.Moulin, “Embedded-signal design for channel parameter estimation.Part II: Quantization embedding,” in Proc. IEEE Statistical Signal Pro-cessing Workshop, Sep. 2003, pp. 42–45.

[18] J. J. Eggers, R. Bauml, R. Tzschoppe, and B. Girod, “Scalar Costascheme for information embedding,” IEEE Trans. Signal Process., vol.51, no. 4, pp. 1003–1019, Apr. 2003.

[19] I. D. Shterev and R. L. Lagendijk, “Maximum likelihood amplitudescale estimation for quantization-based watermarking in the presenceof dither,” in Proc. SPIE Security, Steganography, Watermarking Mul-timedia Contents VII, San Jose, CA, Jan. 2005.

[20] P. Moulin, A. Briassouli, and H. Malvar, “Detection-theoretic analysisof desynchronization attacks in watermarking,” in Proc. 14th Int. Conf.Digital Signal Processing, Jul. 2002, pp. 77–84.

[21] K. M. Whelan, F. Balado, G. C. M. Silvestre, and N. J. Hurley, “PLL-based synchronization of dither modulation data hiding,” inProc. IEEEInt. Conf. Accoustics, Speech and Signal Processing, Toulouse, France,May 2006.

[22] M. Feder and A. Lapidoth, “Universal decoding for channels withmemory,” IEEE Trans. Inf. Theory, vol. 44, no. 5, pp. 1726–1745,Sep. 1998.

[23] A. Lapidoth and P. Narayan, “Reliable communication under channeluncertainty,” IEEE Trans. Inf. Theory, vol. 44, no. 6, pp. 2148–2177,Oct. 1998.

[24] P. Moulin, “Universal decoding of watermarks under geometric at-tacks,” in Proc. IEEE Int. Symp. Information Theory, Jul. 2006, pp.2353–2357.

[25] P. Moulin, “On the optimal structure of watermark decoders underdesynchronization attacks,” inProc. IEEE Int. Conf. Image Processing,Oct. 2006, pp. 2589–2592.

[26] S. Sadasivam and P. Moulin, “On estimation accuracy of desynchro-nization attack channel parameters,” IEEE Trans. Inf. Forensics Secu-rity, vol. 4, no. 3, pp. 284–292, Sep. 2009.

[27] S. L. Lauritzen, Graphical Models. Oxford, U.K.: Oxford Univ.Press, 1996.

[28] J. Pearl, Probabilistic Reasoning in Intelligent Systems. San Mateo,CA: Morgan Kaufmann, 1988.

[29] B. J. Frey, Graphical Models for Machine Learning and Digital Com-munication. Cambridge, MA: MIT Press, 1998.

[30] F. R. Kschischang, B. J. Frey, and H.-A. Loeliger, “Factor graphsand the sum-product algorithm,” Special Issue on Codes on Graphsand Iterative Algorithms, IEEE Trans. Inf. Theory, vol. 47, no. 2, pp.498–519, Feb. 2001.

[31] J. S. Yedidia, W. T. Freeman, and Y.Weiss, “Generalized belief propa-gation,” in Proc. Advances in Neural Information Processing Systems,Dec. 2000, vol. 13, pp. 689–695.

[32] M. I. Jordan, “Graphical models,” Special issue on Bayesian Statistics,Statist. Sci., vol. 19, pp. 140–155, 2004.

SADASIVAM et al.: MESSAGE-PASSING APPROACH TO COMBATING DESYNCHRONIZATION ATTACKS 905

[33] H.-A. Loeliger, “An introduction to factor graphs,” IEEE SignalProcess. Mag., vol. 21, no. 1, pp. 28–41, Jan. 2004.

[34] J. H. G. Dauwels, “On Graphical Models for Communications andMachine Learning: Algorithms, Bounds, and Analog Implementation,”Ph.D. thesis, Swiss Federal Institute of Technology, Zurich, May 2006.

[35] S. Geman and D. Geman, “Stochastic relaxation, Gibbs distributionsand the Bayesian restoration of images,” IEEE Trans. Pattern Anal.Mach. Intell., vol. 6, no. 6, pp. 721–741, Nov. 1984.

[36] T. Richardson and R. Urbanke, Modern Coding Theory. Cambridge,U.K.: Cambridge Univ. Press, 2008.

[37] J. Besag, “Spatial interaction and the statistical analysis of lattice sys-tems,” J. Royal Statist. Society B, vol. 36, no. 2, pp. 192–236, 1974.

Shankar Sadasivam (S’07) received the B.Tech. de-gree in electrical engineering from the Indian Insti-tute of Technology (IIT), Madras, in 2005, and theM.S. and Ph.D. degrees in electrical and computer en-gineering from the University of Illinois at Urbana-Champaign (UIUC), in 2008 and 2011, respectively.He is currently with Qualcomm Corporate R&D,

San Diego, CA. His research interests include signalprocessing, communications, estimation theory, andmachine learning. During the Fall 2007 and Spring2008 semesters, he served as a teaching assistant for

graduate level courses on Information Theory, and Signal Detection and Estima-tion Theory, respectively. He spent the summer of 2007 at IBM Research, NY,working on problems in the areas of optimization and workforce scheduling,and the summer of 2004 at École Polytechnique Fédérale de Lausanne (EPFL),Switzerland, working on the design of pipelined analog-to-digital converters.

Pierre Moulin (S’89–M’90–SM’98–F’03) receivedthe doctoral degree from Washington University, St.Louis in 1990.After receiving the doctoral degree, he joined Bell

Communications Research in Morristown, NJ, as aResearch Scientist. In 1996, he joined the Univer-sity of Illinois at Urbana-Champaign, where he iscurrently Professor in the Department of Electricaland Computer Engineering, Research Professor atthe Beckman Institute and the Coordinated ScienceLaboratory, and affiliate professor in the Department

of Statistics. His fields of professional interest include image and videoprocessing, compression, statistical signal processing and modeling, mediasecurity, decision theory, and information theory.Dr. Moulin has served on the editorial boards of the IEEE TRANSACTIONS ON

INFORMATION THEORY and the IEEE TRANSACTIONS ON IMAGE PROCESSING.He currently serves on the editorial boards of the PROCEEDINGS OF IEEE andof Foundations and Trends in Signal Processing. He was cofounding Editor-in-Chief of the IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY(2005–2008), member of the IEEE Signal Processing Society Board of Gov-ernors (2005–2007), and has served IEEE in various other capacities. He re-ceived a 1997 Career award from the National Science Foundation and an IEEESignal Processing Society 1997 Senior Best Paper award. He is also coauthor(with Juan Liu) of a paper that received an IEEE Signal Processing Society2002 Young Author Best Paper award. He was 2003 Beckman Associate ofUIUC’s Center for Advanced Study, 2006–2008 Sony Faculty Scholar, and ple-nary speaker for ICASSP 2006 and several other conferences.

Todd P. Coleman (S’01–M’05) received the B.S.degrees in electrical engineering (summa cumlaude), as well as computer engineering (summa cumlaude) from the University of Michigan, Ann Arbor,in 2000. He received the M.S. and Ph.D. degreesin electrical engineering from the MassachusettsInstitute of Technology (MIT), Cambridge, in 2002and 2005, respectively.During the 2005–2006 academic year, he was a

postdoctoral scholar at MIT’s Department of Brainand Cognitive Sciences and Massachusetts General

Hospital’s Neuroscience Statistics Research Laboratory in computational neu-roscience. Since the fall of 2006, he has been on the faculty in the Electrical andComputer Engineering Department and Neuroscience Program at the Univer-sity of Illinois. His research interests include information theory, control theory,computational neuroscience, and brain–machine interfaces.Dr. Coleman was awarded the College of Engineering’s Hugh Rumler Senior

Class Prize from the University of Michigan. He was a recipient of the Na-tional Science Foundation Graduate Research Fellowship and the MIT EECSDepartment’s Morris J. Levin Award for Best Masterworks Oral Thesis Presen-tation from MIT. In Fall 2008, he was a corecipient of the University of IllinoisCollege of Engineerings Grainger Award in Emerging Technologies. Since Fall2009, he has served as a co-Principal Investigator for an NSF IGERT inter-disciplinary training grant for graduate students, titled “Neuro-engineering: AUnified Educational Program for Systems Engineering and Neuroscience.”