Practical performance analysis of secure modulations for woa spread-spectrum based image watermarking

This paper presents the first practical analysis of secure modulations for watermarking of still images in the case of a WOA (Watermarked Only Attack) attack framework (the attacker observes only marked contents). Two recent spread spectrum modulations, namely Natural Watermarking (NW) and Circular Watermarking (CW) are compared against classical modulations, namely Spread Spectrum (SS) and Improved Spread Spectrum (ISS). Results are discussed from the distorsion point of view, as well as from the the robustness and security point of view. We emphasize that the experiments were carried out on a rather significant number of images (2000) and demonstrate the relevance of these modulations in a real-world application.

[1]  François Cayre,et al.  Achieving subspace or key security for WOA using natural or circular watermarking , 2006, MM&Sec '06.

[2]  Teddy Furon,et al.  Watermarking Attack: Security of WSS Techniques , 2004, IWDW.

[3]  Mauro Barni,et al.  DCT-based watermark recovering without resorting to the uncorrupted original image , 1997, Proceedings of International Conference on Image Processing.

[4]  Aapo Hyvärinen,et al.  A Fast Fixed-Point Algorithm for Independent Component Analysis , 1997, Neural Computation.

[5]  Henrique S. Malvar,et al.  Improved spread spectrum: a new modulation technique for robust watermarking , 2003, IEEE Trans. Signal Process..

[6]  François Cayre,et al.  Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding , 2008, IEEE Transactions on Information Forensics and Security.

[7]  Aapo Hyvärinen,et al.  The Fixed-Point Algorithm and Maximum Likelihood Estimation for Independent Component Analysis , 1999, Neural Processing Letters.

[8]  François Cayre,et al.  Natural Watermarking: A Secure Spread Spectrum Technique for WOA , 2006, Information Hiding.

[9]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[10]  Thierry Pun,et al.  Method for the estimation and recovering from general affine transforms in digital watermarking applications , 2002, IS&T/SPIE Electronic Imaging.

[11]  Aapo Hyvärinen,et al.  Fast and robust fixed-point algorithms for independent component analysis , 1999, IEEE Trans. Neural Networks.

[12]  C. Fontaine,et al.  Watermarking security: theory and practice , 2005, IEEE Transactions on Signal Processing.

[13]  Gwenaël J. Doërr,et al.  Practical Security Analysis of Dirty Paper Trellis Watermarking , 2007, Information Hiding.