Cryptanalysis of a Wavelet Based Watermarking Scheme

  • Tanmoy Kanti Das
  • Jianying Zhou
  • Subhamoy Maitra
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3304)


In this paper we cryptanalyze the wavelet based watermarking scheme by Wang et al, 2002. By cryptanalysis we mean the removal of the watermark using a single watermarked copy which is equivalent to cipher text only jamming attack. The watermark embedding process replaces a particular middle frequency band of the host image (in wavelet domain) with the watermark. In the scheme, the key consists of three secrets: (i) the watermark, (ii) the random filter bank used for wavelet transform and (iii) the wavelet band where the watermark is inserted. First we observe that the secret random filter bank does not provide any security since it can be replaced by any filter bank from a large class. Further, it is possible to discover the secret wavelet band used to watermark the host image. Though in cryptography the random nature of secret key provides the security, in contrary here we show that the random nature of the watermark actually helps in identifying the secret wavelet band and consequently one can remove the watermarking signal from that band to mount the successful cryptanalytic attack.


Correlation Cryptanalysis Digital Watermarking Wavelet Transform 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Anderson, R.J., Petitcolas, F.A.P.: On The Limits of Steganography. IEEE Journal of Selected Areas in Communications 16(4), 474–481 (1998); Special Issue on Copyright and Privacy ProtectionGoogle Scholar
  2. 2.
    Cox, I.J., Kilian, J., Leighton, T., Shamoon, T.: Secure Spread Spectrum Watermarking for Multimedia. IEEE Transactions on Image Processing 6(12), 1673–1687 (1997)CrossRefGoogle Scholar
  3. 3.
    Das, T.K., Maitra, S.: Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 135–148. Springer, Heidelberg (2002); An extended version of this paper has been accepted in IEEE Transactions on Signal Processing, to be published in February 2005 Google Scholar
  4. 4.
    Das, T.K.: Cryptanalysis of Block Based Spatial Domain Watermarking Schemes. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 363–374. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  5. 5.
    Das, T.K., Maitra, S.: Cryptanalysis of Correlation Based Watermarking Schemes using Single Watermarked Copy. IEEE Signal Processing Letters 11(4), 446–449 (2004)CrossRefGoogle Scholar
  6. 6.
    Daubechies, I.: Ten Lectures on Wavelets. SIAM, Philadelphia (1992)CrossRefzbMATHGoogle Scholar
  7. 7.
    Ergun, F., Kilian, J., Kumar, R.: A Note on the Limits of Collusion-Resistant Watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 140. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  8. 8.
    Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proceedings of IEEE 87(7) (July 1999)Google Scholar
  9. 9.
    Kalker, T., Linnartz, J.P.M.G., Dijk, M.v.: Watermark Estimation through Detector Analysis. In: International Conference on Image Processing (1998)Google Scholar
  10. 10.
    Katzenbeisser, S., Petitcolas, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking. Artech House, USA (2000)Google Scholar
  11. 11.
    Kirovski, D., Petitcolas, F.A.P.: Replacement Attack on Arbitrary Watermarking Systems. In: ACM workshop on Digital Rights Management (2002)Google Scholar
  12. 12.
    Langelaar, G.C., Lagendijk, R.L.: Optimal Differential Energy Watermarking of DCT Encoded Images and Video. IEEE Transactions on Image Processing 10(1), 148–158 (2001)CrossRefzbMATHGoogle Scholar
  13. 13.
    Linnartz, J.P.M.G., Dijk, M.v.: Analysis of the Sensitivity Attack Against Electronic Watermarks in Images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  14. 14.
    Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G., Aucsmith, D.: Attacks on Copyright Marking Systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 218–238. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  15. 15.
    Petitcolas, F.A.P., Anderson, R.J.: Evaluation of Copyright Marking Systems. In: IEEE Multimedia Systems, Florence, Italy (June 1999)Google Scholar
  16. 16.
    Vetterli, M., Kovacevic, J.: Wavelets and Subband Coding. Prentice-Hall PTR, Englewood Cliffs (1995)zbMATHGoogle Scholar
  17. 17.
    Wang, Y., Doherty, J.F., VanDyck, R.E.: A Wavelet-Based Watermarking Algorithm for Ownership Verification of Digital Images. IEEE Transactions on Image Processing 11(2), 77–88 (2002)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Tanmoy Kanti Das
    • 1
  • Jianying Zhou
    • 2
  • Subhamoy Maitra
    • 1
  1. 1.Applied Statistics UnitIndian Statistical InstituteCalcuttaIndia
  2. 2.Infocomm Security DepartmentInstitute for Infocomm ResearchSingapore

Personalised recommendations