Cryptanalysis of a Wavelet Based Watermarking Scheme
In this paper we cryptanalyze the wavelet based watermarking scheme by Wang et al, 2002. By cryptanalysis we mean the removal of the watermark using a single watermarked copy which is equivalent to cipher text only jamming attack. The watermark embedding process replaces a particular middle frequency band of the host image (in wavelet domain) with the watermark. In the scheme, the key consists of three secrets: (i) the watermark, (ii) the random filter bank used for wavelet transform and (iii) the wavelet band where the watermark is inserted. First we observe that the secret random filter bank does not provide any security since it can be replaced by any filter bank from a large class. Further, it is possible to discover the secret wavelet band used to watermark the host image. Though in cryptography the random nature of secret key provides the security, in contrary here we show that the random nature of the watermark actually helps in identifying the secret wavelet band and consequently one can remove the watermarking signal from that band to mount the successful cryptanalytic attack.
KeywordsCorrelation Cryptanalysis Digital Watermarking Wavelet Transform
Unable to display preview. Download preview PDF.
- 1.Anderson, R.J., Petitcolas, F.A.P.: On The Limits of Steganography. IEEE Journal of Selected Areas in Communications 16(4), 474–481 (1998); Special Issue on Copyright and Privacy ProtectionGoogle Scholar
- 3.Das, T.K., Maitra, S.: Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 135–148. Springer, Heidelberg (2002); An extended version of this paper has been accepted in IEEE Transactions on Signal Processing, to be published in February 2005 Google Scholar
- 8.Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proceedings of IEEE 87(7) (July 1999)Google Scholar
- 9.Kalker, T., Linnartz, J.P.M.G., Dijk, M.v.: Watermark Estimation through Detector Analysis. In: International Conference on Image Processing (1998)Google Scholar
- 10.Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, USA (2000)Google Scholar
- 11.Kirovski, D., Petitcolas, F.A.P.: Replacement Attack on Arbitrary Watermarking Systems. In: ACM workshop on Digital Rights Management (2002)Google Scholar
- 15.Petitcolas, F.A.P., Anderson, R.J.: Evaluation of Copyright Marking Systems. In: IEEE Multimedia Systems, Florence, Italy (June 1999)Google Scholar