Ten lectures on wavelets
Wavelets and subband coding
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Attacks on Copyright Marking Systems
Proceedings of the Second International Workshop on Information Hiding
Evaluation of Copyright Marking Systems
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
A note on the limits of collusion-resistant watermarks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Secure spread spectrum watermarking for multimedia
IEEE Transactions on Image Processing
Optimal differential energy watermarking of DCT encoded images and video
IEEE Transactions on Image Processing
A wavelet-based watermarking algorithm for ownership verification of digital images
IEEE Transactions on Image Processing
A fragile watermarking scheme protecting originator's rights for multimedia service
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Hi-index | 0.00 |
In this paper we cryptanalyze the wavelet based watermarking scheme by Wang et al, 2002. By cryptanalysis we mean the removal of the watermark using a single watermarked copy which is equivalent to cipher text only jamming attack. The watermark embedding process replaces a particular middle frequency band of the host image (in wavelet domain) with the watermark. In the scheme, the key consists of three secrets: (i) the watermark, (ii) the random filter bank used for wavelet transform and (iii) the wavelet band where the watermark is inserted. First we observe that the secret random filter bank does not provide any security since it can be replaced by any filter bank from a large class. Further, it is possible to discover the secret wavelet band used to watermark the host image. Though in cryptography the random nature of secret key provides the security, in contrary here we show that the random nature of the watermark actually helps in identifying the secret wavelet band and consequently one can remove the watermarking signal from that band to mount the successful cryptanalytic attack.