Skip to main content

Watermarking Attack: Security of WSS Techniques

  • Conference paper
Digital Watermarking (IWDW 2004)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3304))

Included in the following conference series:

Abstract

Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proportional to the difficulty the opponent has to recover the secret parameters, which are, in WSS watermarking scheme, the private carriers. Both theoretical and practical points of view are investigated when several pieces of content are watermarked with the same secret key. The opponent’s difficulty is measured by the amount of data necessary to estimate accurately the private carriers, and also by the complexity of the estimation algorithms. Actually, Blind Source Separation algorithms really help the opponent exploiting the information leakage to disclose the secret carriers. The article ends with experiments comparing blind attacks to these new hacks. The main goal of the article is to warn watermarkers that embedding hidden messages with the same secret key might is a dangerous security flaws.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Petitcolas, F., Steinebach, M., Raynal, F., Dittmann, J., Fontaine, C., Fates, N.: Public automated web-based evaluation service for watermarking schemes: Stirmark benchmark. In: IS&T/SPIE International Symposium on Electronic Imaging 2001, Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 575–584 (2001)

    Google Scholar 

  2. Kalker, T.: Considerations on watermarking seccurity. In: Proc. of the IEEE Multimedia Signal Processing workshop, Cannes, France, pp. 201–206 (2001)

    Google Scholar 

  3. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. on information theory 22, 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  4. Shannon, C.: Communication theory of secrecy systems. Bell system technical journal 28, 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  5. Moulin, P.: The role of information theory in watermarking and its application to image watermarking. Signal Processing 81, 1121–1139 (2001)

    Article  MATH  Google Scholar 

  6. Cox, I., Miller, M., Bloom, J.: Principles and Practice. Morgan Kaufmann Publisher, San Francisco (2001)

    Google Scholar 

  7. Cayre, F., Fontaine, C., Furon, T.: Watermarking security: Theory and Practice. Accepted to IEEE transactions of Signal Processing (2004)

    Google Scholar 

  8. González-Serrano, F., Murillo-Fuentes, J.: Independent component analysis applied to image watermarking. In: ICASSP 2001 (2001)

    Google Scholar 

  9. Bounkong, S., Toch, B., Saad, D., Lowe, D.: ICA for watermarking digital images. Journal of Machine Learning Research 1, 1–25 (2002)

    MATH  Google Scholar 

  10. Du, J., Lee, C.H., Lee, H.K., Suh, Y.: Watermark attack based on blind estimation without priors. In: IWDW 2002. LNCS, Springer, Heidelberg (2002)

    Google Scholar 

  11. Doërr, G., Dugelay, J.L.: Danger of low-dimensional watermarking subspaces. In: Proc. ICASSP, Montrea, Canada, vol. 3. IEEE, Los Alamitos (2004)

    Google Scholar 

  12. Pateux, S., Guelvouit, G.L.: Practical watermarking scheme based on wide spread spectrum and game theory. Signal Processing: Image Communication 18, 283–296 (2003)

    Google Scholar 

  13. Eggers, J., Baüml, R., Tzschoppe, R., Girod, B.: Scalar costa scheme for information embedding. IEEE Trans. on Signal Processing 51, 1003–1019 (2003)

    Google Scholar 

  14. Chen, B., Wornell, G.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. On Information Theory 47, 1423–1443 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  15. Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Signal Processing 83, 2069–2084 (2003); Special issue on Security of Data Hiding Technologies (invited paper)

    Google Scholar 

  16. Furon, T., Duhamel, P.: An asymmetric watermarking method. IEEE Trans. on Signal Processing 51, 981–995 (2003); Special issue on signal processing for data hiding in digital media & secure content delivery

    Google Scholar 

  17. Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires 9, 5–38 (1883)

    Google Scholar 

  18. Stoica, P., Ng, B.: On the cramer-rao bound under parametric constraints. IEEE Signal Processing Letters 5, 177–179 (1998)

    Article  Google Scholar 

  19. Hyvärinen, A., Oja, E.: Independent component analysis: a tutorial. Neural Networks 13, 411–430 (2000)

    Article  Google Scholar 

  20. Douglas, S.: Blind source separation and independent component analysis: a crossroad of tools and ideas. In: Proceedings of Fourth International Symposium on Independent Component Analysis and Blind Signal Separation, ICA 2003 (2003)

    Google Scholar 

  21. Dempster, A., Laird, N., Rubin, D.: Maximum likelihood from incomplete data via the em algorithm. J. Roy. Stat. Soc., 1–38 (1977)

    Google Scholar 

  22. Hyvärinen, A.: Fast and robust fixed-point algorithms for independent component analysis. IEEE Transactions on Neural Networks 10, 626–634 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cayre, F., Fontaine, C., Furon, T. (2005). Watermarking Attack: Security of WSS Techniques. In: Cox, I.J., Kalker, T., Lee, HK. (eds) Digital Watermarking. IWDW 2004. Lecture Notes in Computer Science, vol 3304. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31805-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31805-7_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24839-2

  • Online ISBN: 978-3-540-31805-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics