DocumentCode :
1171637
Title :
Watermarking security: theory and practice
Author :
Cayre, François ; Fontaine, Caroline ; Furon, Teddy
Author_Institution :
IRISA/TEMICS, Campus Univ. de Beaulieu, Rennes, France
Volume :
53
Issue :
10
fYear :
2005
Firstpage :
3976
Lastpage :
3987
Abstract :
This paper proposes a theory of watermarking security based on a cryptanalysis point of view. The main idea is that information about the secret key leaks from the observations, for instance, watermarked pieces of content, available to the opponent. Tools from information theory (Shannon´s mutual information and Fisher´s information matrix) can measure this leakage of information. The security level is then defined as the number of observations the attacker needs to successfully estimate the secret key. This theory is applied to two common watermarking methods: the substitutive scheme and the spread spectrum-based techniques. Their security levels are calculated against three kinds of attack. The experimental work illustrates how Blind Source Separation (especially Independent Component Analysis) algorithms help the opponent exploiting this information leakage to disclose the secret carriers in the spread spectrum case. Simulations assess the security levels derived in the theoretical part of the paper.
Keywords :
blind source separation; cryptography; watermarking; Fisher information matrix; blind source separation; cryptanalysis; information theory; spread spectrum techniques; substitutive scheme; watermarking security; Communication channels; Copyright protection; Degradation; Information security; Information theory; Matrices; Mutual information; Robustness; Spread spectrum communication; Watermarking; Blind source separation; Fisher information matrix; equivocation; security; watermarking;
fLanguage :
English
Journal_Title :
Signal Processing, IEEE Transactions on
Publisher :
ieee
ISSN :
1053-587X
Type :
jour
DOI :
10.1109/TSP.2005.855418
Filename :
1511011
Link To Document :
بازگشت