Title :
Controllable Secure Watermarking Technique for Tradeoff Between Robustness and Security
Author :
Jian Cao ; Jiwu Huang
Author_Institution :
Sch. of Inf. Sci. & Technol., Sun Yat-Sen Univ., Guangzhou, China
fDate :
4/1/2012 12:00:00 AM
Abstract :
The circular watermarking (CW) technique has attracted increasing attention because it can resist the estimation of secret carriers in the watermarked only attack (WOA) framework. However, the existing CW schemes are not applicable whenever a malicious watermark removal attack can take place. This is because they either have low security because the attacker can disclose the embedding subspace or have low robustness. Based on an existing CW scheme called transportation natural watermarking (TNW), this correspondence presents a new CW technique for the tradeoff between robustness and security, which we refer to as controllable secure watermarking (CSW). The idea behind the CSW is that by altering the host signal in the orthogonal complement of the embedding subspace, we can make the watermarked signal have an orthogonally invariant distribution in a higher dimensional subspace including the embedding subspace. Orthogonally invariant distribution essentially requires that the distribution does not change if multiplied by any freely chosen orthogonal matrix, and the higher dimensional subspace is referred to as invariant subspace. We prove that the attacker can only reduce the uncertainty of secret carriers up to the invariant subspace. The dimension of the invariant subspace can be used for the tradeoff between robustness and security. Further, the experiment results show that the robustness-security tradeoff provided by the CSW is efficient. In particular, with the increase of the dimension of the invariant subspace, the security of the CSW will increase quickly while its robustness will only decrease slowly.
Keywords :
estimation theory; matrix algebra; watermarking; CSW; TNW; WOA; circular watermarking; controllable secure watermarking technique; embedding subspace; invariant subspace; malicious watermark; orthogonal complement; orthogonal matrix; secret carriers estimation; transportation natural watermarking; watermarked only attack; Estimation; Histograms; Robustness; Uncertainty; Vectors; Watermarking; Robustness; spread spectrum watermarking; watermarked only attack (WOA); watermarking security;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2012.2184093