Abstract
Spread-spectrum based watermarking has become a widely used watermarking method in recent years and its security reliability has drawn research attention. Previous work on evaluating watermarking security is mainly based on the assumption that the host is Gaussian distributed and ignores the impact of the non-Gaussian characteristics of natural images. This paper presents a theoretical analysis on the security of spread-spectrum based watermarking with the incorporation of the statistics of natural images. By calculating the Cramer-Rao Bound and Modified Cramer-Rao Bound of the estimation of secret carriers under Known Message Attack and Watermarked Only Attack, this paper investigates factors such as the number of observations, the length of secret carriers, the embedded power, and the distribution of embedded messages that may influence the security of spread-spectrum based watermarking algorithms. Results obtained in this paper are very helpful for designing the new generation of secure and robust watermarking systems.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Cayre, F., Fontaine, C., Furon, T.: Watermarking Security: Theory and Practice. IEEE Trans. Signal Processing 53, 3976–3987 (2005)
Kerckhoffs, A.: La Cryptographie Militaire. Journal des Militaries 9, 5–38 (1983)
Furon, T., et at.: Security Analysis, European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5 (2002)
Comesaña, P., Péres-Freire, L., Péres-González, F.: Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727. Springer, Heidelberg (2005)
Cox, J., Miller, M.L., Bloom, J.A.: Digital Watermarking. Elsevier Science, Amsterdam (2002)
Ni, Q., Zhang, R.Y., Fang, C., Huang, J.W., Wang, C.T.: Watermarking Security Incorporating Natural Scene Statistics. In: IH 2008 (May 2008)
Wainwright, M.J., Simoncelli, E.P.: Scale Mixtures of Gaussians and the Statistics of Natural Images. In: Advances in Neural Information Processing Systems (NIPS 1999), vol. 12, pp. 855–861. MIT Press, Cambridge (2000)
van Trees, H.L.: Detection, Estimation, and Modulation Theory. John Wiley and Sons, Chichester (1968)
Frieden, B.R., Gatenby, R.A.: Exploratory Data Analysis Using Fisher Information. Springer, Heidelberg (2007)
Portilla, Strela, V., Wainwright, M.J., Simoncelli, E.P.: Image Denoising Using Scale Mixtures of Gaussians in the Wavelet Domain. IEEE Trans. On Image Processing 12(11), 1338–1351 (2003)
Amari, S.I., Cardoso, J.F.: Blind Source Separation – Semiparametric Statistical Approach. IEEE Trans. Signal Processing 45(11), 2692–2700 (1997); Special issue on neural networks
Stoica, P., Ng, B.C.: On the Craner-Rao Bound Under Parametric Constraints. IEEE Signal Processing Lett. 5(7), 177–179 (1998)
D’Andrea, N.A., Mengli, U., Reggiannini, R.: The Modified Carmer-Rao Bound and its Application to Synchronization Problems. IEEE Trans. Commun. 42, 1391–1399 (1994)
Chou, Y.-l.: Statistical Analysis, Holt International (1969)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, D., Ni, J., Lee, DJ. (2008). Security Analysis for Spread-Spectrum Watermarking Incorporating Statistics of Natural Images. In: Bebis, G., et al. Advances in Visual Computing. ISVC 2008. Lecture Notes in Computer Science, vol 5359. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89646-3_39
Download citation
DOI: https://doi.org/10.1007/978-3-540-89646-3_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89645-6
Online ISBN: 978-3-540-89646-3
eBook Packages: Computer ScienceComputer Science (R0)