Loading [a11y]/accessibility-menu.js
Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security | IEEE Journals & Magazine | IEEE Xplore

Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security


Abstract:

The circular watermarking (CW) technique has attracted increasing attention because it can resist the estimation of secret carriers in the watermarked only attack (WOA) f...Show More

Abstract:

The circular watermarking (CW) technique has attracted increasing attention because it can resist the estimation of secret carriers in the watermarked only attack (WOA) framework. However, the existing CW schemes are not applicable whenever a malicious watermark removal attack can take place. This is because they either have low security because the attacker can disclose the embedding subspace or have low robustness. Based on an existing CW scheme called transportation natural watermarking (TNW), this correspondence presents a new CW technique for the tradeoff between robustness and security, which we refer to as controllable secure watermarking (CSW). The idea behind the CSW is that by altering the host signal in the orthogonal complement of the embedding subspace, we can make the watermarked signal have an orthogonally invariant distribution in a higher dimensional subspace including the embedding subspace. Orthogonally invariant distribution essentially requires that the distribution does not change if multiplied by any freely chosen orthogonal matrix, and the higher dimensional subspace is referred to as invariant subspace. We prove that the attacker can only reduce the uncertainty of secret carriers up to the invariant subspace. The dimension of the invariant subspace can be used for the tradeoff between robustness and security. Further, the experiment results show that the robustness-security tradeoff provided by the CSW is efficient. In particular, with the increase of the dimension of the invariant subspace, the security of the CSW will increase quickly while its robustness will only decrease slowly.
Published in: IEEE Transactions on Information Forensics and Security ( Volume: 7, Issue: 2, April 2012)
Page(s): 821 - 826
Date of Publication: 12 January 2012

ISSN Information:


References

References is not available for this document.