61
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      The Effective Key Length of Watermarking Schemes

      Preprint
      ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Whereas the embedding distortion, the payload and the robustness of digital watermarking schemes are well understood, the notion of security is still not completely well defined. The approach proposed in the last five years is too theoretical and solely considers the embedding process, which is half of the watermarking scheme. This paper proposes a new measurement of watermarking security, called the effective key length, which captures the difficulty for the adversary to get access to the watermarking channel. This new methodology is applied to additive spread spectrum schemes where theoretical and practical computations of the effective key length are proposed. It shows that these schemes are not secure as soon as the adversary gets observations in the Known Message Attack context.

          Related collections

          Most cited references5

          • Record: found
          • Abstract: not found
          • Article: not found

          Communication Theory of Secrecy Systems*

          C. Shannon (1949)
            Bookmark
            • Record: found
            • Abstract: found
            • Article: not found

            Secure spread spectrum watermarking for multimedia.

            This paper presents a secure (tamper-resistant) algorithm for watermarking images, and a methodology for digital watermarking that may be generalized to audio, video, and multimedia data. We advocate that a watermark should be constructed as an independent and identically distributed (i.i.d.) Gaussian random vector that is imperceptibly inserted in a spread-spectrum-like fashion into the perceptually most significant spectral components of the data. We argue that insertion of a watermark under this regime makes the watermark robust to signal processing operations (such as lossy compression, filtering, digital-analog and analog-digital conversion, requantization, etc.), and common geometric transformations (such as cropping, scaling, translation, and rotation) provided that the original image is available and that it can be successfully registered against the transformed watermarked image. In these cases, the watermark detector unambiguously identifies the owner. Further, the use of Gaussian noise, ensures strong resilience to multiple-document, or collusional, attacks. Experimental results are provided to support these claims, along with an exposition of pending open problems.
              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Quantization index modulation: a class of provably good methods for digital watermarking and information embedding

                Bookmark

                Author and article information

                Journal
                16 February 2012
                Article
                1202.3562
                0f52535e-d1c9-4ffd-8b09-f178545cecbd

                http://creativecommons.org/licenses/by-nc-sa/3.0/

                History
                Custom metadata
                cs.CR

                Comments

                Comment on this article