Abstract
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proportional to the difficulty the opponent has to recover the secret parameters, which are, in WSS watermarking scheme, the private carriers. Both theoretical and practical points of view are investigated when several pieces of content are watermarked with the same secret key. The opponent’s difficulty is measured by the amount of data necessary to estimate accurately the private carriers, and also by the complexity of the estimation algorithms. Actually, Blind Source Separation algorithms really help the opponent exploiting the information leakage to disclose the secret carriers. The article ends with experiments comparing blind attacks to these new hacks. The main goal of the article is to warn watermarkers that embedding hidden messages with the same secret key might is a dangerous security flaws.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Petitcolas, F., Steinebach, M., Raynal, F., Dittmann, J., Fontaine, C., Fates, N.: Public automated web-based evaluation service for watermarking schemes: Stirmark benchmark. In: IS&T/SPIE International Symposium on Electronic Imaging 2001, Security and Watermarking of Multimedia Contents III, vol. 4314, pp. 575–584 (2001)
Kalker, T.: Considerations on watermarking seccurity. In: Proc. of the IEEE Multimedia Signal Processing workshop, Cannes, France, pp. 201–206 (2001)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. on information theory 22, 644–654 (1976)
Shannon, C.: Communication theory of secrecy systems. Bell system technical journal 28, 656–715 (1949)
Moulin, P.: The role of information theory in watermarking and its application to image watermarking. Signal Processing 81, 1121–1139 (2001)
Cox, I., Miller, M., Bloom, J.: Principles and Practice. Morgan Kaufmann Publisher, San Francisco (2001)
Cayre, F., Fontaine, C., Furon, T.: Watermarking security: Theory and Practice. Accepted to IEEE transactions of Signal Processing (2004)
González-Serrano, F., Murillo-Fuentes, J.: Independent component analysis applied to image watermarking. In: ICASSP 2001 (2001)
Bounkong, S., Toch, B., Saad, D., Lowe, D.: ICA for watermarking digital images. Journal of Machine Learning Research 1, 1–25 (2002)
Du, J., Lee, C.H., Lee, H.K., Suh, Y.: Watermark attack based on blind estimation without priors. In: IWDW 2002. LNCS, Springer, Heidelberg (2002)
Doërr, G., Dugelay, J.L.: Danger of low-dimensional watermarking subspaces. In: Proc. ICASSP, Montrea, Canada, vol. 3. IEEE, Los Alamitos (2004)
Pateux, S., Guelvouit, G.L.: Practical watermarking scheme based on wide spread spectrum and game theory. Signal Processing: Image Communication 18, 283–296 (2003)
Eggers, J., Baüml, R., Tzschoppe, R., Girod, B.: Scalar costa scheme for information embedding. IEEE Trans. on Signal Processing 51, 1003–1019 (2003)
Chen, B., Wornell, G.: Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE Trans. On Information Theory 47, 1423–1443 (2001)
Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Signal Processing 83, 2069–2084 (2003); Special issue on Security of Data Hiding Technologies (invited paper)
Furon, T., Duhamel, P.: An asymmetric watermarking method. IEEE Trans. on Signal Processing 51, 981–995 (2003); Special issue on signal processing for data hiding in digital media & secure content delivery
Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires 9, 5–38 (1883)
Stoica, P., Ng, B.: On the cramer-rao bound under parametric constraints. IEEE Signal Processing Letters 5, 177–179 (1998)
Hyvärinen, A., Oja, E.: Independent component analysis: a tutorial. Neural Networks 13, 411–430 (2000)
Douglas, S.: Blind source separation and independent component analysis: a crossroad of tools and ideas. In: Proceedings of Fourth International Symposium on Independent Component Analysis and Blind Signal Separation, ICA 2003 (2003)
Dempster, A., Laird, N., Rubin, D.: Maximum likelihood from incomplete data via the em algorithm. J. Roy. Stat. Soc., 1–38 (1977)
Hyvärinen, A.: Fast and robust fixed-point algorithms for independent component analysis. IEEE Transactions on Neural Networks 10, 626–634 (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cayre, F., Fontaine, C., Furon, T. (2005). Watermarking Attack: Security of WSS Techniques. In: Cox, I.J., Kalker, T., Lee, HK. (eds) Digital Watermarking. IWDW 2004. Lecture Notes in Computer Science, vol 3304. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31805-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-31805-7_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24839-2
Online ISBN: 978-3-540-31805-7
eBook Packages: Computer ScienceComputer Science (R0)