An asymmetric watermarking method

This paper presents an asymmetric watermarking method as an alternative to classical direct sequence spread spectrum and watermarking Costa (1983) schemes techniques. This new method provides a higher security level against malicious attacks threatening watermarking techniques used for a copy protection purpose. This application, which is quite different from the classical copyright enforcement issue, is extremely challenging as no public algorithm is yet known to be secure enough, and some proposed proprietary techniques have been already hacked. Our method is thus an attempt toward the proof that the Kerckhoff's (1883) principle can be stated in the copy protection framework.

[1]  Brian Chen Digital watermarking, information embedding, and data hiding systems , 2000 .

[2]  Max H. M. Costa,et al.  Writing on dirty paper , 1983, IEEE Trans. Inf. Theory.

[3]  Bernd Girod,et al.  Informed Watermarking , 2002 .

[4]  Imants D. Svalbe,et al.  Key independent watermark detection , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[5]  Pierre Duhamel,et al.  An Asymmetric Public Detection Watermarking Technique , 1999, Information Hiding.

[6]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[7]  Jean-Paul M. G. Linnartz,et al.  Some general methods for tampering with watermarks , 1998, IEEE J. Sel. Areas Commun..

[8]  Julien P. Stern,et al.  Automatic Detection of a Watermarked Document Using a Private Key , 2001, Information Hiding.

[9]  Richard A. Davis,et al.  Time Series: Theory and Methods , 2013 .

[10]  Ingemar J. Cox,et al.  Copy protection for DVD video , 1999, Proc. IEEE.

[11]  Joshua R. Smith,et al.  Developments in Steganography , 1999, Information Hiding.

[12]  Kannan Ramchandran,et al.  A robust blind watermarking scheme based on distributed source coding principles , 2000, ACM Multimedia.

[13]  Bernd Girod,et al.  Public key watermarking by eigenvectors of linear transforms , 2000, 2000 10th European Signal Processing Conference.

[14]  E. Lehmann,et al.  Testing Statistical Hypothesis. , 1960 .

[15]  Pierre Duhamel,et al.  Audio asymmetric watermarking technique , 2000 .

[16]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[17]  Nicolas Moreau,et al.  Cyclostationarity-Based Audio Watermarking with Private and Public Hidden Data , 2000 .

[18]  Justin Picard,et al.  Neural Networks Functions for Public Key Watermarking , 2001, Information Hiding.

[19]  Christian Cachin,et al.  An information-theoretic model for steganography , 1998, Inf. Comput..

[20]  Mauro Barni,et al.  A new decoder for the optimum recovery of nonadditive watermarks , 2001, IEEE Trans. Image Process..

[21]  Pierre Duhamel,et al.  Audio public key watermarking technique , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).

[22]  Pierre Duhamel,et al.  Robustness of an asymmetric technique , 2003 .

[23]  Pierre Duhamel,et al.  Unified approach of asymmetric watermarking schemes , 2001, IS&T/SPIE Electronic Imaging.

[24]  Mohamed F. Mansour,et al.  Secure detection of public watermarks with fractal decision boundaries , 2002, 2002 11th European Signal Processing Conference.

[25]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[26]  K. Ramchandran,et al.  Turbo coded trellis-based constructions for data embedding: channel coding with side information , 2001, Conference Record of Thirty-Fifth Asilomar Conference on Signals, Systems and Computers (Cat.No.01CH37256).

[27]  Julien P. Stern,et al.  Lessons learned from SDMI , 2001, 2001 IEEE Fourth Workshop on Multimedia Signal Processing (Cat. No.01TH8564).

[28]  Neil J. Hurley,et al.  Informed audio watermarking scheme using digital chaotic signals , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[29]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[30]  K. Dzhaparidze Parameter estimation and hypothesis testing in spectral analysis of stationary time series , 1986 .

[31]  Ingemar J. Cox,et al.  Watermarking as communications with side information , 1999, Proc. IEEE.

[32]  Bernd Girod,et al.  Fast public-key watermarking of compressed video , 1997, Proceedings of International Conference on Image Processing.

[33]  Joachim J. Eggers,et al.  Information embedding and digital watermarking as communication with side information , 2001 .

[34]  Ahmed H. Tewfik,et al.  Robust audio watermarking using perceptual masking , 1998, Signal Process..

[35]  Ton Kalker,et al.  Title: a Security Risk for Publicly Available Watermark Detectors Author: Ton Kalker Conference: Benelux Information Theory Symposium a Security Risk for Publicly Available Watermark Detectors , 1998 .

[36]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[37]  D. Kahn Cryptology and the origins of spread spectrum: Engineers during World War II developed an unbreakable scrambler to guarantee secure communications between Allied leaders; actress Hedy Lamarr played a role in the technology , 1984, IEEE Spectrum.

[38]  Mauro Barni,et al.  Optimum Decoding of Non-additive Full Frame DFT Watermarks , 1999, Information Hiding.

[39]  Simon Singh,et al.  The Code Book , 1999 .

[40]  T. Furon,et al.  Robustness of asymmetric watermarking technique , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[41]  Richard E. Blahut,et al.  Principles and practice of information theory , 1987 .