Security Analysis of Content-Based Watermarking Authentication Framework

被引:4
|
作者
Wang, Jinwei [1 ]
Liu, Guangjie [2 ]
Lian, Shiguo [3 ]
机构
[1] CETC, Res Inst 28, Nanjing 210007, Peoples R China
[2] Univ Sci & Technol, Nanjing 210094, Peoples R China
[3] France Telecom R&D Beijing, Beijing 100080, Peoples R China
关键词
security analysis; authentication; feature watermark; watermark embedding; architecture;
D O I
10.1109/MINES.2009.181
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper analyzes the security of content-based watermarking authentication framework in the extraction of the feature watermark and the watermark embedding using information theory. Security analysis of feature watermark is composed of four parts, that is, the extracted feature is as watermark, the encrypted feature after extracted is as watermark, the encrypted feature before extracted is as watermark and the encrypted feature while extracted is as watermark. Security of watermark embedding is analyzed from two parts, that is, the watermark embedding is controlled by secret key and the watermark embedding is no secret key. Additionally, the integration security of the feature watermark and the watermark embedding is analyzed from eight aspects. Through the security analysis of these architectures, some important conclusions are proved and drawn, a the corresponding suggestions are pointed out.
引用
收藏
页码:483 / +
页数:2
相关论文
共 50 条
  • [31] Content-based digital watermarking using contrast and directionality
    Kim, ND
    Reed, A
    PICS 2002: IMAGE PROCESSING, IMAGE QUALITY, IMAGE CAPTURE, SYSTEMS CONFERENCE, PROCEEDINGS, 2002, : 234 - 238
  • [32] Robust and efficient content-based digital audio watermarking
    Changsheng Xu
    David Dagan Feng
    Multimedia Systems, 2002, 8 : 353 - 368
  • [33] Content-based multipurpose watermarking for remote sensing images
    Zhao, Rui
    Jiang, Gangwu
    Wang, Shugen
    GEOINFORMATICS 2007: REMOTELY SENSED DATA AND INFORMATION, PTS 1 AND 2, 2007, 6752
  • [34] Content-based adaptive watermarking algorithm in ridgelet domain
    Guo, Shengqiang
    Cao, Hanqiang
    Deng, Chengzhi
    2008 INTERNATIONAL CONFERENCE ON AUDIO, LANGUAGE AND IMAGE PROCESSING, VOLS 1 AND 2, PROCEEDINGS, 2008, : 619 - 623
  • [35] A robust content-based digital image watermarking scheme
    Qi, Xiaojun
    Qi, Ji
    SIGNAL PROCESSING, 2007, 87 (06) : 1264 - 1280
  • [36] A Framework for Mobile eLearning (mLearning) with Content Security and Authentication
    Dewan, Jahangir
    Chowdhury, Morshed
    2013 SECOND IIAI INTERNATIONAL CONFERENCE ON ADVANCED APPLIED INFORMATICS (IIAI-AAI 2013), 2013, : 95 - 99
  • [37] Infrastructure Provisioning for Scalable Content-based Routing: Framework and Analysis
    Barazzutti, Raphael
    Felber, Pascal
    Mercier, Hugues
    Onica, Emanuel
    Pineau, Jean-Francois
    Riviere, Etienne
    Fetzer, Christof
    2012 11TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2012, : 228 - 235
  • [38] Content Authentication Based on JPEG-to-JPEG Watermarking
    Hong-Xia Wang
    Journal of Electronic Science and Technology, 2009, 7 (02) : 125 - 128
  • [39] GENERIC ATTACKS ON CONTENT-BASED VIDEO STREAM AUTHENTICATION
    Lo, Swee-Won
    Wei, Zhuo
    Ding, Xuhua
    Deng, Robert H.
    2014 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO WORKSHOPS (ICMEW), 2014,
  • [40] Limitations and requirements of content-based multimedia authentication systems
    Wu, CW
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS III, 2001, 4314 : 241 - 252