On achievable security levels for lattice data hiding in the known message attack scenario
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Assessing motion-coherency in video watermarking
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
On the capacity of stegosystems
Proceedings of the 9th workshop on Multimedia & security
Proceedings of the 9th workshop on Multimedia & security
An interpolation-based watermarking scheme
Signal Processing
Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes
Proceedings of the 10th ACM workshop on Multimedia and security
Watermarking Security Incorporating Natural Scene Statistics
Information Hiding
Security Analysis for Spread-Spectrum Watermarking Incorporating Statistics of Natural Images
ISVC '08 Proceedings of the 4th International Symposium on Advances in Visual Computing, Part II
On the Complexity of Obtaining Optimal Watermarking Schemes
IWDW '07 Proceedings of the 6th International Workshop on Digital Watermarking
EURASIP Journal on Information Security
Two key estimation techniques for the broken arrows watermarking scheme
Proceedings of the 11th ACM workshop on Multimedia and security
Optimization of natural watermarking using transportation theory
Proceedings of the 11th ACM workshop on Multimedia and security
The square root law requires a linear key
Proceedings of the 11th ACM workshop on Multimedia and security
Spread-spectrum watermarking security
IEEE Transactions on Information Forensics and Security
On estimation accuracy of desynchronization attack channel parameters
IEEE Transactions on Information Forensics and Security
Robust audio data hiding using correlated quantization with histogram-based detector
IEEE Transactions on Multimedia
Attack on "Watermarking method based on significant difference of wavelet coefficient quantization"
IEEE Transactions on Multimedia
Watermarking: how secure is the DM-QIM embedding technique?
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Exploiting security holes in lattice data hiding
IH'07 Proceedings of the 9th international conference on Information hiding
Security evaluation of informed watermarking schemes
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Data embedding in JPEG bitstream by code mapping
IEEE Transactions on Image Processing
Perceptual image hashing based on virtual watermark detection
IEEE Transactions on Image Processing
Towards robust and secure watermarking
Proceedings of the 12th ACM workshop on Multimedia and security
On the secrecy of spread-spectrum flow watermarks
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Security analysis of ISS watermarking using natural scene statistics
IH'10 Proceedings of the 12th international conference on Information hiding
Provably secure spread-spectrum watermarking schemes in the known message attack framework
IH'10 Proceedings of the 12th international conference on Information hiding
A new spread spectrum watermarking scheme to achieve a trade-off between security and robustness
IH'10 Proceedings of the 12th international conference on Information hiding
Technical Section: Robust and blind mesh watermarking based on volume moments
Computers and Graphics
NEHIPISIC'11 Proceeding of 10th WSEAS international conference on electronics, hardware, wireless and optical communications, and 10th WSEAS international conference on signal processing, robotics and automation, and 3rd WSEAS international conference on nanotechnology, and 2nd WSEAS international conference on Plasma-fusion-nuclear physics
IH'11 Proceedings of the 13th international conference on Information hiding
Watermarking attack: security of WSS techniques
IWDW'04 Proceedings of the Third international conference on Digital Watermarking
A spread spectrum watermarking scheme based on periodic clock changes for digital images
IH'05 Proceedings of the 7th international conference on Information Hiding
Watermarking security: a survey
Transactions on Data Hiding and Multimedia Security I
Watermarking is not cryptography
IWDW'06 Proceedings of the 5th international conference on Digital Watermarking
Securing color information of an image by concealing the color palette
Journal of Systems and Software
A new measure of watermarking security applied on QIM
IH'12 Proceedings of the 14th international conference on Information Hiding
IH'12 Proceedings of the 14th international conference on Information Hiding
Information theory applications in error bit rate analysis of digital image watermarking
Computers and Electrical Engineering
A computationally efficient algorithm for the 2D covariance method
SC '13 Proceedings of the International Conference on High Performance Computing, Networking, Storage and Analysis
Counterfeiting attacks on block-wise dependent fragile watermarking schemes
Proceedings of the 6th International Conference on Security of Information and Networks
Modeling and preventing inferences from sensitive value distributions in data release
Journal of Computer Security - STM'10
Hi-index | 0.00 |
This paper proposes a theory of watermarking security based on a cryptanalysis point of view. The main idea is that information about the secret key leaks from the observations, for instance, watermarked pieces of content, available to the opponent. Tools from information theory (Shannon's mutual information and Fisher's information matrix) can measure this leakage of information. The security level is then defined as the number of observations the attacker needs to successfully estimate the secret key. This theory is applied to two common watermarking methods: the substitutive scheme and the spread spectrum-based techniques. Their security levels are calculated against three kinds of attack. The experimental work illustrates how Blind Source Separation (especially Independent Component Analysis) algorithms help the opponent exploiting this information leakage to disclose the secret carriers in the spread spectrum case. Simulations assess the security levels derived in the theoretical part of the paper.