Cryptanalysis of a Wavelet Based Watermarking Scheme

In this paper we cryptanalyze the wavelet based watermarking scheme by Wang et al, 2002. By cryptanalysis we mean the removal of the watermark using a single watermarked copy which is equivalent to cipher text only jamming attack. The watermark embedding process replaces a particular middle frequency band of the host image (in wavelet domain) with the watermark. In the scheme, the key consists of three secrets: (i) the watermark, (ii) the random filter bank used for wavelet transform and (iii) the wavelet band where the watermark is inserted. First we observe that the secret random filter bank does not provide any security since it can be replaced by any filter bank from a large class. Further, it is possible to discover the secret wavelet band used to watermark the host image. Though in cryptography the random nature of secret key provides the security, in contrary here we show that the random nature of the watermark actually helps in identifying the secret wavelet band and consequently one can remove the watermarking signal from that band to mount the successful cryptanalytic attack.

[1]  Ingrid Daubechies,et al.  Ten Lectures on Wavelets , 1992 .

[2]  Frank Hartung,et al.  Multimedia watermarking techniques , 1999, Proc. IEEE.

[3]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[4]  Yiwei Wang,et al.  A wavelet-based watermarking algorithm for ownership verification of digital images , 2002, IEEE Trans. Image Process..

[5]  Reginald L. Lagendijk,et al.  Optimal differential energy watermarking of DCT encoded images and video , 2001, IEEE Trans. Image Process..

[6]  Tanmoy Kanti Das Cryptanalysis of Block Based Spatial Domain Watermarking Schemes , 2003, INDOCRYPT.

[7]  Subhamoy Maitra,et al.  Cryptanalysis of optimal differential energy watermarking (DEW) and a modified robust scheme , 2005, IEEE Transactions on Signal Processing.

[8]  Subhamoy Maitra,et al.  Cryptanalysis of correlation-based watermarking schemes using single watermarked copy , 2004, IEEE Signal Processing Letters.

[9]  Thomas Johansson,et al.  Progress in Cryptology - INDOCRYPT 2003 , 2003, Lecture Notes in Computer Science.

[10]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[11]  Stephan Katzenbeisser,et al.  Information Hiding Techniques for Steganography and Digital Watermaking , 1999 .

[12]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[13]  Jacques Stern,et al.  Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.

[14]  Ingemar J. Cox,et al.  Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..

[15]  Darko Kirovski,et al.  Replacement Attack on Arbitrary Watermarking Systems , 2002, Digital Rights Management Workshop.

[16]  Jean-Paul M. G. Linnartz,et al.  Watermark estimation through detector analysis , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[17]  Ross J. Anderson,et al.  Evaluation of copyright marking systems , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[18]  Jelena Kovacevic,et al.  Wavelets and Subband Coding , 2013, Prentice Hall Signal Processing Series.

[19]  Joe Kilian,et al.  A Note on the Limits of Collusion-Resistant Watermarks , 1999, EUROCRYPT.