Skip to main content

Security Analysis for Spread-Spectrum Watermarking Incorporating Statistics of Natural Images

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNIP,volume 5359))

Abstract

Spread-spectrum based watermarking has become a widely used watermarking method in recent years and its security reliability has drawn research attention. Previous work on evaluating watermarking security is mainly based on the assumption that the host is Gaussian distributed and ignores the impact of the non-Gaussian characteristics of natural images. This paper presents a theoretical analysis on the security of spread-spectrum based watermarking with the incorporation of the statistics of natural images. By calculating the Cramer-Rao Bound and Modified Cramer-Rao Bound of the estimation of secret carriers under Known Message Attack and Watermarked Only Attack, this paper investigates factors such as the number of observations, the length of secret carriers, the embedded power, and the distribution of embedded messages that may influence the security of spread-spectrum based watermarking algorithms. Results obtained in this paper are very helpful for designing the new generation of secure and robust watermarking systems.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cayre, F., Fontaine, C., Furon, T.: Watermarking Security: Theory and Practice. IEEE Trans. Signal Processing 53, 3976–3987 (2005)

    Article  MathSciNet  Google Scholar 

  2. Kerckhoffs, A.: La Cryptographie Militaire. Journal des Militaries 9, 5–38 (1983)

    Google Scholar 

  3. Furon, T., et at.: Security Analysis, European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5 (2002)

    Google Scholar 

  4. Comesaña, P., Péres-Freire, L., Péres-González, F.: Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Cox, J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Elsevier Science, Amsterdam (2002)

    Google Scholar 

  6. Ni, Q., Zhang, R.Y., Fang, C., Huang, J.W., Wang, C.T.: Watermarking Security Incorporating Natural Scene Statistics. In: IH 2008 (May 2008)

    Google Scholar 

  7. Wainwright, M.J., Simoncelli, E.P.: Scale Mixtures of Gaussians and the Statistics of Natural Images. In: Advances in Neural Information Processing Systems (NIPS 1999), vol. 12, pp. 855–861. MIT Press, Cambridge (2000)

    Google Scholar 

  8. van Trees, H.L.: Detection, Estimation, and Modulation Theory. John Wiley and Sons, Chichester (1968)

    MATH  Google Scholar 

  9. Frieden, B.R., Gatenby, R.A.: Exploratory Data Analysis Using Fisher Information. Springer, Heidelberg (2007)

    Book  MATH  Google Scholar 

  10. Portilla, Strela, V., Wainwright, M.J., Simoncelli, E.P.: Image Denoising Using Scale Mixtures of Gaussians in the Wavelet Domain. IEEE Trans. On Image Processing 12(11), 1338–1351 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  11. Amari, S.I., Cardoso, J.F.: Blind Source Separation – Semiparametric Statistical Approach. IEEE Trans. Signal Processing 45(11), 2692–2700 (1997); Special issue on neural networks

    Article  Google Scholar 

  12. Stoica, P., Ng, B.C.: On the Craner-Rao Bound Under Parametric Constraints. IEEE Signal Processing Lett. 5(7), 177–179 (1998)

    Article  Google Scholar 

  13. D’Andrea, N.A., Mengli, U., Reggiannini, R.: The Modified Carmer-Rao Bound and its Application to Synchronization Problems. IEEE Trans. Commun. 42, 1391–1399 (1994)

    Article  Google Scholar 

  14. Chou, Y.-l.: Statistical Analysis, Holt International (1969)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, D., Ni, J., Lee, DJ. (2008). Security Analysis for Spread-Spectrum Watermarking Incorporating Statistics of Natural Images. In: Bebis, G., et al. Advances in Visual Computing. ISVC 2008. Lecture Notes in Computer Science, vol 5359. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89646-3_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-89646-3_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-89645-6

  • Online ISBN: 978-3-540-89646-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics