Skip to main content

Cryptanalysis of Barni et al. Watermarking Scheme

  • Conference paper
Progress in Cryptology - INDOCRYPT 2005 (INDOCRYPT 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3797))

Included in the following conference series:

  • 681 Accesses

Abstract

In this paper, we analyze a wavelet based watermarking scheme proposed by Barni et al in 2001. The said scheme modifies high frequency wavelet coefficients to embed a watermark in an image. The scheme employs well known HVS model during embedding to embed the watermark in a perceptually transparent manner. Here we present a successful cryptanalysis of the scheme using single watermarked copy. In the process of cryptanalysis, we recover the watermark signal from the marked image and the attack is similar to cryptographic key recovery attack. Furthermore, we not only successfully recover the secret watermark signal from the attacked image, but also we are able to remove the watermark. This raises a serious question about the security and usability of the watermarking scheme in any practical system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.J., Petitcolas, F.A.P.: On The Limits of Steganography. IEEE Journal of Selected Areas in Communications. Special Issue on Copyright and Privacy Protection 16(4), 474–481 (1998)

    Google Scholar 

  2. Barni, M., Bartolini, F., Piva, A.: Improved Wavelet-Based Watermarking Through Pixel-Wise Masking. IEEE Transactions on Image Processing 10(5) (May 2001)

    Google Scholar 

  3. Boeuf, J., Stern, J.P.: An Analysis of One of the SDMI Candidates. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 395–410. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Craver, S., Memon, N., Yeo, B.-L., Yeung, M.M.: Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal of Selected Areas in Communications 16(4), 573–586 (1998) ISSN 0733-8716, special issue on copyright & privacy protection

    Article  Google Scholar 

  5. Craver, S., Liu, B., Wolf, W.: An Implementation of, and Attacks on, Zero-Knowledge Watermarking. In: Fridrich, J. (ed.) IH 2004. LNCS, vol. 3200, pp. 1–12. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Cayre, F., Fontaine, C., Furon, T.: Watermarking Attack: Security of WSS Techniques. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 171–183. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Daubechies, I.: Ten Lectures on Wavelets. SIAM, Philadelphia (1992)

    MATH  Google Scholar 

  8. Ergun, F., Kilian, J., Kumar, R.: A Note on the Limits of Collusion-Resistant Watermarks. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, p. 140. Springer, Heidelberg (1999)

    Google Scholar 

  9. Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proceedings of IEEE 87(7) (July 1999)

    Google Scholar 

  10. Kalker, T., Linnartz, J.P.M.G., Dijk, M.v.: Watermark Estimation through Detector Analysis. In: International Conference on Image Processing (1998)

    Google Scholar 

  11. Kerckhoffs, A.: La Cryptographie Militaire. Journal des Sciences Militaires, 9th series IX, 5–38 (February 1883); 161–191 (January 1883)

    Google Scholar 

  12. Kirovski, D., Petitcolas, F.A.P.: Replacement Attack on Arbitrary Watermarking Systems. In: ACM workshop on Digital Rights Management (2002)

    Google Scholar 

  13. Kutter, M., Voloshynovskiy, S., Herrigrl, A.: The Watermark Copy Attack. In: Security and Watermarking of Multimedia Contents II, SPIE-3971, pp. 371–380 (2000)

    Google Scholar 

  14. Lewis, A.S., Knowles, G.: Image Compression Using the 2-D Wavelet Transform. IEEE Transactions on Image Processing 1, 244–250 (1992)

    Article  Google Scholar 

  15. Linnartz, J.P.M.G., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  16. Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G., Aucsmith, D.: Attacks on Copyright Marking Systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 218–238. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  17. Petitcolas, F.A.P., Anderson, R.J.: Evaluation of Copyright Marking Systems. In: IEEE Multimedia Systems, Florence, Italy (June 1999)

    Google Scholar 

  18. Vetterli, M., Kovacevic, J.: Wavelets and Subband Coding. Prentice-Hall PTR, Upper Saddle River (1995)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Das, T.K., Zhou, J. (2005). Cryptanalysis of Barni et al. Watermarking Scheme. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds) Progress in Cryptology - INDOCRYPT 2005. INDOCRYPT 2005. Lecture Notes in Computer Science, vol 3797. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596219_16

Download citation

  • DOI: https://doi.org/10.1007/11596219_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30805-8

  • Online ISBN: 978-3-540-32278-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics