Abstract
The security of digital watermarking methods is based on the assumption that their embedding and detection algorithms are kept secret. They are thus inconvenient for public review and widespread use. A watermarking algorithm that can be open while remaining secure is thus needed. Twelve models that are analogous to cryptanalysis models are described for evaluating the security of digital watermarking. They were used to evaluate the patchwork-based watermarking algorithm and identify its weakness. Two scenarios were then developed that strengthen this algorithm. The use of these models will further the development of an open secure algorithm.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cox, I., et al.: Digital Watermarking. Morgan Kaufmann Pub., San Francisco (2001)
Bender, W., et al.: Techniques for data hiding. IBM Syst. J. 35(3&4), 313–336 (1996)
Cox, I., et al.: A secure, robust watermark for multimedia. In: Proc. Information Hiding First International Workshop, pp. 185–206 (1996)
Bas, P., et al.: Geometrically invariant watermarking using feature points. IEEE Trans. Image Processing 11(9), 1014–1028 (2002)
He, D., et al.: A RST resilient object-based video watermarking scheme. In: Proc. 2004 International Conference on Image Processing, pp. 737–740 (2004)
Kalker, T., et al.: Considerations on watermarking security. In: Proc. Fourth IEEE Workshop on Multimedia Signal Processing, pp. 201–206 (2001)
Zollner, J., et al.: Modeling the security of steganographic systems. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 344–354. Springer, Heidelberg (1998)
Cayre, F., et al.: Watermarking Security: Theory and Practice. IEEE Trans on Signal Processing 53(10), 3976–3987 (2005)
Cayre, F., et al.: Watermarking Attack: Security of WSS Techniques. In: Cox, I., Kalker, T., Lee, H.-K. (eds.) IWDW 2004. LNCS, vol. 3304, pp. 171–183. Springer, Heidelberg (2005)
Schneier, B.: Applied Cryptography. John Wiley & Sons Inc., Chichester (1995)
Goldreich, O.: Foundations of Cryptography. Cambridge University Press, Cambridge (2001)
Furukawa, J.: Secure Detection of Watermarks. IEICE Trans. E87-A, (1), 212–220 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kaneko, S., Echizen, I., Yoshiura, H. (2009). Evaluation and Improvement of Digital Watermarking Algorithm Based on Cryptographic Security Models. In: Kim, HJ., Katzenbeisser, S., Ho, A.T.S. (eds) Digital Watermarking. IWDW 2008. Lecture Notes in Computer Science, vol 5450. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04438-0_34
Download citation
DOI: https://doi.org/10.1007/978-3-642-04438-0_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04437-3
Online ISBN: 978-3-642-04438-0
eBook Packages: Computer ScienceComputer Science (R0)