Paper
21 March 2005 Watermarking security part two: Practice
Francois Cayre, Caroline Fontaine, Teddy Furon
Author Affiliations +
Abstract
This second part focuses on estimation of secret parameters of some practical watermarking techniques. The first part reveals some theoretical bounds of information leakage about secret keys from observations. However, as usual in information theory, nothing has been said about practical algorithms which pirates use in real life application. Whereas Part One deals with the necessary number of observations to disclose secret keys (see definitions of security levels), this part focuses on the complexity or the computing power of practical estimators. Again, we are inspired here by the work of Shannon as in his famous article, he has already made a clear cut between the unicity distance and the work of opponents' algorithm. Our experimental work also illustrates how Blind Source Separation (especially Independent Component Analysis) algorithms help the opponent exploiting this information leakage to disclose the secret carriers in the spread spectrum case. Simulations assess the security levels theoretically derived in Part One.
© (2005) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Francois Cayre, Caroline Fontaine, and Teddy Furon "Watermarking security part two: Practice", Proc. SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, (21 March 2005); https://doi.org/10.1117/12.586890
Lens.org Logo
CITATIONS
Cited by 17 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Digital watermarking

Independent component analysis

Information security

Expectation maximization algorithms

Principal component analysis

Distortion

Algorithms

RELATED CONTENT

Security analysis of public key watermarking schemes
Proceedings of SPIE (December 05 2001)
Advanced audio watermarking benchmarking
Proceedings of SPIE (June 22 2004)
A novel interpretation of content authentication
Proceedings of SPIE (March 01 2007)
Adaptive quantization watermarking
Proceedings of SPIE (June 22 2004)

Back to Top