A theoretical study of watermarking security

This article proposes a theory of watermarking security based on a cryptanalysis point of view. The main idea is that information about the secret key leaks from the observations, for instance watermarked pieces of content, available to the opponent. Tools from information theory (Shannon's mutual information and Fisher's information matrix) can measure this leakage of information. The security level is then defined as the number of observations the attacker needs to successfully estimate the secret key. This theory is applied to two common watermarking methods: the substitutive scheme and the spread spectrum based techniques. Their security levels are calculated against three kinds of attack

[1]  Ton Kalker,et al.  Considerations on watermarking security , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[2]  Ingemar J. Cox,et al.  Informed embedding: exploiting image and detector information during watermark insertion , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[3]  Nasir D. Memon,et al.  On the invertibility of invisible watermarking techniques , 1997, Proceedings of International Conference on Image Processing.

[4]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..

[5]  Teddy Furon,et al.  Watermarking Attack: Security of WSS Techniques , 2004, IWDW.

[6]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[7]  Robert F. H. Fischer,et al.  Lattice Costa schemes using subspace projection for digital watermarking , 2004, Eur. Trans. Telecommun..

[8]  Georgios B. Giannakis,et al.  On regularity and identifiability of blind source separation under constant-modulus constraints , 2004, 2004 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[9]  Thomas Mittelholzer,et al.  An Information-Theoretic Approach to Steganography and Watermarking , 1999, Information Hiding.

[10]  T. Ens,et al.  Blind signal separation : statistical principles , 1998 .

[11]  Fabrice Gamboa,et al.  Source separation when the input sources are discrete or have constant modulus , 1997, IEEE Trans. Signal Process..

[12]  Gregory W. Wornell,et al.  Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.

[13]  Pierre Duhamel,et al.  An asymmetric watermarking method , 2003, IEEE Trans. Signal Process..

[14]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[15]  Mauro Barni,et al.  A general framework for robust watermarking security , 2003, Signal Process..

[16]  Alle-Jan van der Veen,et al.  Blind separation of BPSK sources with residual carriers , 1999, Signal Process..

[17]  Eckhard Koch,et al.  Copyright labeling of digitized image data , 1998 .

[18]  Henrique S. Malvar,et al.  Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..

[19]  B. C. Ng,et al.  On the Cramer-Rao bound under parametric constraints , 1998, IEEE Signal Processing Letters.

[20]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[21]  Pierre Moulin,et al.  The role of information theory in watermarking and its application to image watermarking , 2001, Signal Process..

[22]  Gaëtan Le Guelvouit,et al.  Practical watermarking scheme based on wide spread spectrum and game theory , 2003, Signal Process. Image Commun..

[23]  Shun-ichi Amari,et al.  Blind source separation-semiparametric statistical approach , 1997, IEEE Trans. Signal Process..

[24]  Dinh-Tuan Pham,et al.  Blind separation of instantaneous mixtures of nonstationary sources , 2001, IEEE Trans. Signal Process..

[25]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[26]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[27]  Ali N. Akansu,et al.  Guest editorial special issue on signal processing for data hiding in digital media and secure content delivery , 2003, IEEE Trans. Signal Process..

[28]  Bernd Girod,et al.  Scalar Costa scheme for information embedding , 2003, IEEE Trans. Signal Process..