Watermarking Attack: Security of WSS Techniques
نویسندگان
چکیده
Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proportional to the difficulty the opponent has to recover the secret parameters, which are, in WSS watermarking scheme, the private carriers. Both theoretical and practical points of view are investigated when several pieces of content are watermarked with the same secret key. The opponent’s difficulty is measured by the amount of data necessary to estimate accurately the private carriers, and also by the complexity of the estimation algorithms. Actually, Blind Source Separation algorithms really help the opponent exploiting the information leakage to disclose the secret carriers. The article ends with experiments comparing blind attacks to these new hacks. The main goal of the article is to warn watermarkers that embedding hidden messages with the same secret key might is a dangerous security flaws.
منابع مشابه
Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack
Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...
متن کاملCondition for Energy Efficient Watermarking with Random Vector Model without WSS Assumption
Energy efficient watermarking preserves the watermark energy after linear attack as much as possible. We consider in this letter non-stationary signal models and derive conditions for energy efficient watermarking under random vector model without WSS assumption. We find that the covariance matrix of the energy efficient watermark should be proportional to host covariance matrix to best resist ...
متن کاملA chaos-based video watermarking algorithm
The intriguing characteristics of chaotic maps have prompted researchers to use these sequences in watermarking systems to good effect. In this paper we aim to use a tent map to encrypt the binary logo to achieve a like-noise signal. This approach makes extraction of the watermark signal by potential attacker very hard. Embedding locations are selected based on certain principles. Experimental ...
متن کاملDigital Watermarking Techniques and Security Issues
Digital watermarking is the process of embedding information into a noise-tolerant digital signal such as image or audio data to easily identify the copyright ownership of the media. Such information is embedded for many different purposes, such as copyright protection, source tracking, piracy deterrence, etc., and therefore it shall be embedded in a way that makes it difficult to be removed. T...
متن کاملRobust and Secure Watermarking for Multimedia Traitor Tracing
This thesis focuses on the design of a robust and secure watermarking technique in the contextof multimedia fingerprinting for traitors tracing; and proposes a complete multimediafingerprinting system. Our work builds on a robust zero-bit watermarking technique `BrokenArrows', and we propose two improvements to make it more robust, especially, to prevent A.Westfeld's denoising a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2004