SECURITY EVALUATION OF INFORMED WATERMARKING SCHEMES

被引:5
作者
Braci, Sofiane [1 ]
Boyer, Remy [1 ]
Delpha, Claude [1 ]
机构
[1] Univ Paris 11, Lab Signaux & Syst L2S, CNRS, SUPELEC, Orsay, France
来源
2009 16TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-6 | 2009年
关键词
Security;
D O I
10.1109/ICIP.2009.5414122
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, security evaluation of an important watermarking class based on quantization is given. Theoretical developments and practical simulations are used to measure the security level of watermarking techniques. We give the contribution of each observation available to the attacker on the total gathered information about the watermarking secrecy. By leading on watermarking technique weaknesses, we find that using the Quantization Index Modulation (QIM) with continuous secret key is equivalent to using a secret key with two states. The latter is easier to estimate than a continuous key. Then, we propose a secure version of a classical trellis coded quantization watermarking. The security is guaranteed thanks to the trellis path generated from the discrete key and the message. We show that the spread transform can represent a second or alternative security level for watermarking systems. It allows to increase the watermarking security level and to keep the embedded message hard to read for unauthorise user.
引用
收藏
页码:117 / 120
页数:4
相关论文
共 12 条
[1]  
[Anonymous], IEEE INT C ACC SPEEC
[2]  
Bas P, 2005, LECT NOTES COMPUT SC, V3710, P186
[3]  
BAS P, 2007, LNCS
[4]  
BRACI S, 2008, IEEE P MMSP OCT
[5]   Watermarking security: Theory and practice [J].
Cayre, F ;
Fontaine, C ;
Furon, T .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (10) :3976-3987
[6]   Quantization index modulation: A class of provably good methods for digital watermarking and information embedding [J].
Chen, B ;
Wornell, GW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1423-1443
[7]  
Cox IJ, 2008, MKS MULTIMED INFORM, P1
[8]  
EGGERS JJ, 2003, IEEE T SIGNAL PR APR
[9]   VITERBI ALGORITHM [J].
FORNEY, GD .
PROCEEDINGS OF THE IEEE, 1973, 61 (03) :268-278
[10]  
Guillon P., 2002, P SPIE