Security Analysis of Content-Based Watermarking Authentication Framework

被引:4
|
作者
Wang, Jinwei [1 ]
Liu, Guangjie [2 ]
Lian, Shiguo [3 ]
机构
[1] CETC, Res Inst 28, Nanjing 210007, Peoples R China
[2] Univ Sci & Technol, Nanjing 210094, Peoples R China
[3] France Telecom R&D Beijing, Beijing 100080, Peoples R China
关键词
security analysis; authentication; feature watermark; watermark embedding; architecture;
D O I
10.1109/MINES.2009.181
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper analyzes the security of content-based watermarking authentication framework in the extraction of the feature watermark and the watermark embedding using information theory. Security analysis of feature watermark is composed of four parts, that is, the extracted feature is as watermark, the encrypted feature after extracted is as watermark, the encrypted feature before extracted is as watermark and the encrypted feature while extracted is as watermark. Security of watermark embedding is analyzed from two parts, that is, the watermark embedding is controlled by secret key and the watermark embedding is no secret key. Additionally, the integration security of the feature watermark and the watermark embedding is analyzed from eight aspects. Through the security analysis of these architectures, some important conclusions are proved and drawn, a the corresponding suggestions are pointed out.
引用
收藏
页码:483 / +
页数:2
相关论文
共 50 条
  • [1] Content-based watermarking for image authentication
    Lamy, P
    Martinho, J
    Rosa, T
    Queluz, MP
    INFORMATION HIDING, PROCEEDINGS, 2000, 1768 : 187 - 198
  • [2] CONTENT-BASED AUDIO AUTHENTICATION WATERMARKING
    Gulbis, Michael
    Mueller, Erika
    Steinebach, Martin
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (07): : 1883 - 1892
  • [3] Content-based watermarking scheme for image authentication
    Yu, SS
    Hu, YP
    Zhou, JL
    2004 8TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, VOLS 1-3, 2004, : 1083 - 1087
  • [4] Content-Based Watermarking for Image Authentication Using Independent Component Analysis
    Parameswaran, Latha
    Anbumani, K.
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2008, 32 (03): : 299 - 306
  • [5] A content-based fragile watermarking scheme for image authentication
    Kim, MA
    Lee, WH
    CONTENT COMPUTING, PROCEEDINGS, 2004, 3309 : 258 - 265
  • [6] On Security of Content-Based Video Stream Authentication
    Lo, Swee-Won
    Wei, Zhuo
    Deng, Robert H.
    Ding, Xuhua
    COMPUTER SECURITY - ESORICS 2015, PT I, 2015, 9326 : 366 - 383
  • [7] Content-based authentication watermarking with improved audio content feature extraction
    Gulbis, Michael
    Mueller, Erika
    Steinebach, Martin
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 620 - +
  • [8] Combining multilevel manipulation estimation with content-based authentication watermarking
    Gulbis, Michael
    Mueller, Erika
    Steinebach, Martin
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 461 - +
  • [9] Security Analysis and Improvement of Dual Watermarking Framework for Multimedia Privacy Protection and Content Authentication
    Li, Ming
    Yue, Yange
    MATHEMATICS, 2023, 11 (07)
  • [10] Content-based watermarking in image authentication allowing remedying of tampered images
    Yeh, F. H.
    Lee, G. C.
    OPTICAL ENGINEERING, 2006, 45 (07)