Security Analysis for Spread-Spectrum Watermarking Incorporating Statistics of Natural Images

被引:0
|
作者
Zhang, Dong [1 ,2 ]
Ni, Jiangqun [1 ]
Lee, Dah-Jye [2 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510275, Guangdong, Peoples R China
[2] Brigham Young Univ, Dept Elect & Comp Engn, Provo, UT 84602 USA
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Spread-spectrum based watermarking has become a widely used watermarking method in recent years and its security reliability has drawn research attention. Previous work on evaluating watermarking security is mainly based on the assumption that the host is Gaussian distributed and ignores the impact of the non-Gaussian characteristics of natural images. This paper presents a theoretical analysis on the security of spread-spectrum based watermarking with the incorporation of the statistics of natural images. By calculating the Cramer-Rao Bound and Modified Cramer-Rao Bound of the estimation of secret carriers under Known Message Attack and Watermarked Only Attack, this paper investigates factors such as the number of observations, the length of secret carriers, the embedded power, and the distribution of embedded messages that may influence the security of spread-spectrum based watermarking algorithms. Results obtained in this paper are very helpful for designing the new generation of secure and robust watermarking systems.
引用
收藏
页码:400 / +
页数:2
相关论文
共 50 条
  • [41] Comparison of secure spread-spectrum modulations applied to still image watermarking
    Mathon, Benjamin
    Bas, Patrick
    Cayre, Francois
    Macq, Benoit
    ANNALS OF TELECOMMUNICATIONS, 2009, 64 (11-12) : 801 - 813
  • [42] Robustness of Double Random Phase Encoding spread-space spread-spectrum watermarking technique
    Liu, Shi
    Hennelly, Bryan M.
    Guo, Changliang
    Sheridan, John T.
    SIGNAL PROCESSING, 2015, 109 : 345 - 361
  • [43] Secure spread spectrum watermarking for images, audio and video
    Cox, IJ
    Kilian, J
    Leighton, T
    Shamoon, T
    INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, 1996, : 243 - 246
  • [44] Chaotic spread spectrum watermarking for remote sensing images
    Chen, SY
    Leung, H
    JOURNAL OF ELECTRONIC IMAGING, 2004, 13 (01) : 220 - 230
  • [45] Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework
    Cao, Jian
    Huang, Jiwu
    INFORMATION HIDING, 2010, 6387 : 249 - 261
  • [46] New detector for spread-spectrum based image watermarking using underdetermined ICA
    Malik, H
    Khokhar, A
    Ansari, R
    SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VIII, 2006, 6072
  • [47] Randomized detection for spread-spectrum watermarking: Defending against sensitivity and other attacks
    Venkatesan, R
    Jakubowski, MH
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 9 - 12
  • [48] Optimal multiuser spread-spectrum data hiding in digital images
    Wei, Lili
    Pados, Dimitris A.
    Batalama, Stella N.
    Hu, Rose Qingyang
    Medley, Michael J.
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 540 - 549
  • [49] A robust spread-spectrum watermarking method using two-level quantization
    Ho, ATS
    Shu, F
    ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 725 - 728
  • [50] Natural watermarking: A secure spread spectrum technique for WOA
    Bas, Patrick
    Cayre, Francois
    INFORMATION HIDING, 2007, 4437 : 1 - +