Watermarking security: Theory and practice

被引:177
|
作者
Cayre, F
Fontaine, C
Furon, T
机构
[1] IRISA, TEMICS, F-35042 Rennes, France
[2] Univ Sci & Tech Lille, CNRS, Lab Informat Fondamentale, F-59655 Villeneuve Dascq, France
关键词
blind source separation; equivocation; Fisher information matrix; security; watermarking;
D O I
10.1109/TSP.2005.855418
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a theory of watermarking security based on a cryptanalysis point of view. The main idea is that information about the secret key leaks from the observations, for instance, watermarked pieces of content, available to the opponent. Tools from information theory (Shannon's mutual information and Fisher's information matrix) can measure this leakage of information. The security level is then defined as the. number of observations the attacker needs to successfully estimate the secret key. This theory is applied to two common watermarking methods: the substitutive scheme and the spread spectrum-based techniques. Their security levels are calculated against three kinds of attack. The experimental work illustrates how Blind Source Separation (especially Independent Component Analysis) algorithms help the opponent exploiting this information leakage to, disclose the secret carriers in the spread spectrum case. Simulations assess the security levels derived in the theoretical part of the paper.
引用
收藏
页码:3976 / 3987
页数:12
相关论文
共 50 条
  • [1] Watermarking security part two: Practice
    Cayre, F
    Fontaine, C
    Furon, T
    [J]. SECURITY, STEGANOGRAPHY, AND WATERMARKING OF MULTIMEDIA CONTENTS VII, 2005, 5681 : 758 - 768
  • [2] Watermarking security part one: Theory
    Cayre, F
    Fontaine, C
    Furon, T
    [J]. Security, Steganography, and Watermarking of Multimedia Contents VII, 2005, 5681 : 746 - 757
  • [3] Security Theory and Attack Analysis for Text Watermarking
    Zhou, Xinmin
    Zhao, Weidong
    Wang, Zhicheng
    Pan, Li
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 264 - 269
  • [4] Femtocell Security in Theory and Practice
    van den Broek, Fabian
    Schreur, Ronny Wichers
    [J]. SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 183 - 198
  • [5] Security Regionalism in Theory and Practice
    Hettne, Bjoern
    [J]. ULUSLARARASI ILISKILER-INTERNATIONAL RELATIONS, 2008, 5 (18): : 87 - 106
  • [6] Information Security Theory and Practice
    Vinaja, Robert
    [J]. JOURNAL OF GLOBAL INFORMATION TECHNOLOGY MANAGEMENT, 2015, 18 (04) : 316 - 318
  • [7] Practice and theory in the security debate
    Pettiford, L
    Poku, N
    [J]. SECURITY DIALOGUE, 1996, 27 (03) : 356 - 358
  • [8] SEMI-FRAGILE WATERMARKING BETWEEN THEORY AND PRACTICE
    Mitrea, Mihai
    Hasnaoui, Marwen
    [J]. PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2013, 14 : 328 - 337
  • [9] A hybrid watermarking scheme with CS theory for security of multimedia data
    Thanki, Rohit
    Dwivedi, Vedvyas
    Borisagar, Komal
    [J]. JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2019, 31 (04) : 436 - 451
  • [10] Exploring the Theory and Practice of the Security Dilemma
    Liaropoulos, Andrew
    [J]. INTERNATIONAL SPECTATOR, 2009, 44 (01): : 202 - 204