A general framework for robust watermarking security

被引:74
作者
Barni, M
Bartolini, F
Furon, T
机构
[1] Univ Florence, Dept Elect & Telecommun, I-50139 Florence, Italy
[2] Univ Siena, Dept Informat Engn, I-53100 Siena, Italy
[3] INRIA, IRISA, TEMICS Project, F-35000 Rennes, France
关键词
digital watermarking; watermarking attacks; watermarking security; fair and unfair attacks; Diffie-Hellmann's attacks classification;
D O I
10.1016/S0165-1684(03)00168-3
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The analysis of the security of watermarking algorithms has received increasing attention since it has been recognized that the sole investigation of robustness issues is not enough to properly address the challenges set by practical applications. Such a security analysis, though, is still in its infancy, up to a point that a general agreement has not yet been reached even on the most fundamental problems. The purpose of this paper is to provide a general security framework encompassing most of the problems encountered in real-world applications. By considering the amount of information the attacker has about the watermarking algorithm, we introduce the notion of fair and un-fair attacks, so to ease the classification of different systems and attacks. Though we recognize that many important differences exist between watermarking and cryptographic security, a large part of our work is inspired by the Diffie-Helmann's paradigm, which is widely used in cryptography. For each class of systems great care is taken to describe both the attacker's and watermarker's point of view, presenting the challenges raised by each system to these different actors. Finally, we try to outline some research directions which, according to us, deserve further analysis.
引用
收藏
页码:2069 / 2084
页数:16
相关论文
共 47 条
[1]  
ADELSBACH A, 2002, P EUR SIGN PROC C TO
[2]  
BAS P, 2001, P INT C IM PROC IEEE
[3]   Copy protection for DVD video [J].
Bloom, JA ;
Cox, IJ ;
Kalker, T ;
Linnartz, JPMG ;
Miller, ML ;
Traw, CBS .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1267-1276
[4]   Collusion-secure fingerprinting for digital data [J].
Boneh, D ;
Shaw, J .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) :1897-1905
[5]  
Cachin C, 1998, LECT NOTES COMPUT SC, V1525, P306
[6]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[7]   Some general methods for tampering with watermarks [J].
Cox, IJ ;
Linnartz, JPMG .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :587-593
[8]   Secure spread spectrum watermarking for multimedia [J].
Cox, IJ ;
Kilian, J ;
Leighton, FT ;
Shamoon, T .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 1997, 6 (12) :1673-1687
[9]   Watermarking as communications with side information [J].
Cox, IJ ;
Miller, ML ;
McKellips, AL .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1127-1141
[10]   Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications [J].
Craver, S ;
Memon, N ;
Yeo, BL ;
Yeung, MM .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) :573-586