Skip to main content

Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis

  • Conference paper
Information Hiding (IH 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3727))

Included in the following conference series:

Abstract

This paper puts in consideration the concepts of security and robustness in watermarking, in order to be able to establish a clear frontier between them. A new information-theoretic framework to study data-hiding and watermarking security is proposed, using the mutual information to quantify the information about the secret key that leaks from the observation of watermarked objects. This framework is applied to the analysis of a Spread-Spectrum data-hiding scheme in different scenarios. Finally, we show some interesting links between a measure proposed in previous works in the literature, which is based on Fisher Information Matrix, and our proposed measure.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cox, I.J., Linnartz, J.P.M.G.: Some general methods for tampering with watermarks. IEEE Journal on Selected Areas in Communications 16, 587–593 (1998)

    Article  Google Scholar 

  2. Linnartz, J.-P.M.G., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  3. Mitthelholzer, T.: An information-theoretic approach to steganography and watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 1–17. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  4. Shannon, C.E.: Communication theory of secrecy systems. Bell system technical journal 28, 656–715 (1949)

    MATH  MathSciNet  Google Scholar 

  5. Kalker, T.: Considerations on watermarking security. In: IEEE Int. Workshop on Multimedia Signal Processing, MMSP 2001, Cannes, France, pp. 201–206 (2001)

    Google Scholar 

  6. Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Signal Processing 83, 2069–2084 (2003)

    Article  MATH  Google Scholar 

  7. Cayre, F., Fontaine, C., Furon, T.: Watermarking security part one: theory. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 746–757. SPIE, San Jose (2005)

    Google Scholar 

  8. Furon, T., et al.: Security Analysis. European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5 (2002)

    Google Scholar 

  9. Fisher, R.A.: On the mathematical foundations of theoretical statistics. Philosophical Transactions of the Royal Society 222, 309–368 (1922)

    Article  Google Scholar 

  10. Barni, M., Bartolini, F.: Watermarking Systems Engineering. In: Signal Processing and Communications. Marcel Dekker, New York (2004)

    Google Scholar 

  11. Hernández, J.R., Pérez-González, F.: Throwing more light on image watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 191–207. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  12. Kerckhoff, A.: La cryptographie militaire. Journal des sciences militaires 9, 5–38 (1883)

    Google Scholar 

  13. van Trees, H.L.: Detection, Estimation, and Modulation Theory. John Wiley and Sons, Chichester (1968)

    MATH  Google Scholar 

  14. Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley series in Telecommunications (1991)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Comesaña, P., Pérez-Freire, L., Pérez-González, F. (2005). Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds) Information Hiding. IH 2005. Lecture Notes in Computer Science, vol 3727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558859_12

Download citation

  • DOI: https://doi.org/10.1007/11558859_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29039-1

  • Online ISBN: 978-3-540-31481-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics