Abstract
This paper firstly defines the concept of security classes for spread-spectrum watermarking schemes in a Known Message Attack (KMA) framework. In particular, we define three security classes, namely, by order of increasing security: insecurity, key-security and subspace-security. Then, we present three new spread spectrum watermarking schemes, namely, independent natural watermarking (INW), robust independent natural watermarking (Robust-INW) and independent circular watermarking (ICW). All these new watermarking schemes build on the uniformly distributed random orthogonal matrix which can be estimated by the decoder. And all these schemes (i.e., INW, Robust-INW and ICW) are secure against carriers estimation in the KMA framework.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Signal Processing 83, 2069–2084 (2003)
Cachin, C.: An Information-Theoretic Model for Steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)
Kerckhoffs, A.: La cryptographie militaire. Journal Des Sciences Militaires IX, 5–38 (1883)
Kalker, T.: Considerations on watermarking security. In: Proc. MMSP, Cannes, France, pp. 201–206 (October 2001)
Cayre, F., Furon, T., Fontaine, C.: Watermarking security: Theory and practice. IEEE Trans. Signal Process. 53(10), 3976–3987 (2005)
Cox, I., Killian, J., Leighton, F., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE Trans. Image Processing 6(12), 1673–1687 (1997)
Malvar, H.S., Flôrencio, D.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Trans. Signal Process. 53, 898–905 (2003)
Comesaña, P., Pérez-Freire, L., Pérez-González, F.: Fundamentals of data hiding security and their application to spread-spectrum analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 146–160. Springer, Heidelberg (2005)
Bas, P., Cayre, F.: Achieving subspace or key security for woa using natural or circular watermarking. In: Proc. ACM Multimedia Security Workshop, Geneva (2006)
Cayre, F., Bas, P.: Kerckhoffs-based embedding security classes for WOA Data Hiding. IEEE Trans. Inf. Forensics and Security 3(1), 1–15 (2008)
Bas, P., Cayre, F.: Natural watermarking: a secure spread spectrum technique for WOA. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds.) IH 2006. LNCS, vol. 4437, pp. 1–14. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cao, J., Huang, J. (2010). Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds) Information Hiding. IH 2010. Lecture Notes in Computer Science, vol 6387. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16435-4_19
Download citation
DOI: https://doi.org/10.1007/978-3-642-16435-4_19
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16434-7
Online ISBN: 978-3-642-16435-4
eBook Packages: Computer ScienceComputer Science (R0)