Practical security analysis of dirty paper trellis watermarking

被引:0
|
作者
Bas, Patrick [1 ,2 ]
Doerr, Gwenael [3 ]
机构
[1] CIS Helsinki Univ Technol, POB 5400, FI-02015 Espoo, Finland
[2] CNRS INPG 961, Gipsa Lab, Martin Heres, F-38042 Grenoble, France
[3] UCL, London IP5 3RE, England
来源
INFORMATION HIDING | 2007年 / 4567卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper analyses the security of dirty paper trellis (DPT) watermarking schemes which use both informed coding and informed embedding. After recalling the principles of message embedding with DPT watermarking, the secret parameters of the scheme are highlighted. The security weaknesses of DPT watermarking are then presented: in the watermarked contents only attack (WOA) setup, the watermarked data-set exhibits clusters corresponding to the different patterns attached to the arcs of the trellis. The K-means clustering algorithm is used to estimate these patterns and a co-occurrence analysis is performed to retrieve the connectivity of the trellis. Experimental results demonstrate that it is possible to accurately estimate the trellis configuration, which enables to perform attacks much more efficient than simple additive white Gaussian noise (AWGN).
引用
收藏
页码:174 / +
页数:3
相关论文
共 50 条
  • [31] Practical vector dirty paper coding for MIMO Gaussian broadcast channels
    Lin, Shih-Chun
    Su, Hsuan-Jung
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2007, 25 (07) : 1345 - 1357
  • [32] Performance Analysis of Binned Orthogonal/Bi-Orthogonal Block Code as Dirty-Paper Code for Digital Watermarking Application
    Xu, Xiaotian
    Guan, Yong Liang
    Teh, Kah Chan
    IEEE SIGNAL PROCESSING LETTERS, 2009, 16 (1-3) : 208 - 211
  • [33] Security analysis of an asymmetric watermarking scheme
    Wang, Xin
    Lu, Zhibo
    Peng, Silong
    2006 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-4, 2006, : 2583 - +
  • [34] A Practical Low-Density Coding Scheme for Binary Dirty Paper Channel
    Kayhan, Farbod
    Tanaka, Toshiyuki
    2008 5TH INTERNATIONAL SYMPOSIUM ON TURBO CODES AND RELATED TOPICS, 2008, : 396 - +
  • [35] Practical Dirty Paper Coding with Nested Binary LDGM-LDPC Codes
    Wang, Qingchuan
    He, Chen
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 1933 - 1938
  • [36] Analysis and design of dirty paper coding by transformation of noise
    Lee, Young-Seung
    Chung, Sae-Young
    2007 IEEE 65TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2007, : 1584 - 1588
  • [37] Security of DM quantization watermarking schemes: A practical study for digital images
    Bas, P
    Hurri, J
    DIGITAL WATERMARKING, PROCEEDINGS, 2005, 3710 : 186 - 200
  • [38] WRITING ON DIRTY PAPER
    COSTA, MHM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (03) : 439 - 441
  • [39] Robust bandlimited watermarking with trellis coded modulation
    Thilak, V
    Nosratinia, A
    2002 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOL II, PROCEEDINGS, 2002, : 141 - 144
  • [40] Practical Dirty Paper Coding Schemes Using One Error Correction Code With Syndrome
    Kim, Taehyun
    Kwon, Kyunghoon
    Heo, Jun
    IEEE COMMUNICATIONS LETTERS, 2017, 21 (06) : 1257 - 1260