Over-Complete-Dictionary-Based Improved Spread Spectrum Watermarking Security

被引:7
作者
Hua, Guang [1 ]
机构
[1] Wuhan Univ, Sch Elect Informat, Wuhan 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
Decoding; Watermarking; Transforms; Force; Matching pursuit algorithms; Dictionaries; Watermarking security; spread spectrum security; over-complete dictionary; compressive sensing security;
D O I
10.1109/LSP.2020.2986154
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This letter presents a theoretical analysis of the security of two over-complete-dictionary-based improved spread spectrum (ISS) watermarking systems, i.e., subspace-ISS (sub-ISS) and random matching pursuit (RMP)-ISS, in comparison with the conventional orthogonal-transform-based ISS system. Considering Kerckhoffs' principle and the watermarked-only attack (WOA) scenario, we derive the associated decoding regions under brute force attack in which the adversary randomly draws probing keys until getting access to the watermarking channel. We first reveal that the sub-ISS system is as equally secure as the conventional ISS system in terms of message decoding, but the sensed key could provide computational security of the spreading key. More importantly, the RMP-ISS system is shown to be securer than the conventional ISS system for it being able to survive brute force attack. Based on the findings, we further propose an empirical design mechanism that optimizes the security of the RMP-ISS scheme.
引用
收藏
页码:770 / 774
页数:5
相关论文
共 13 条
[1]   A New Measure of Watermarking Security: The Effective Key Length [J].
Bas, Patrick ;
Furon, Teddy .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) :1306-1317
[2]   Analysis of One-Time Random Projections for Privacy Preserving Compressed Sensing [J].
Bianchi, Tiziano ;
Bioglio, Valerio ;
Magli, Enrico .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (02) :313-327
[3]   Low-Complexity Multiclass Encryption by Compressed Sensing [J].
Cambareri, Valerio ;
Mangia, Mauro ;
Pareschi, Fabio ;
Rovatti, Riccardo ;
Setti, Gianluca .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (09) :2183-2195
[4]   Watermarking security: Theory and practice [J].
Cayre, F ;
Fontaine, C ;
Furon, T .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (10) :3976-3987
[5]  
Comesaña P, 2005, LECT NOTES COMPUT SC, V3727, P146
[6]   Random Matching Pursuit for Image Watermarking [J].
Hua, Guang ;
Zhao, Lifan ;
Zhang, Haijian ;
Bi, Guoan ;
Xiang, Yong .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2019, 29 (03) :625-639
[7]   When Compressive Sensing Meets Data Hiding [J].
Hua, Guang ;
Xiang, Yong ;
Bi, Guoan .
IEEE SIGNAL PROCESSING LETTERS, 2016, 23 (04) :473-477
[8]   Considerations on watermarking security [J].
Kalker, T .
2001 IEEE FOURTH WORKSHOP ON MULTIMEDIA SIGNAL PROCESSING, 2001, :201-206
[9]   Security of lattice-based data hiding against the known message attack [J].
Perez-Freire, Luis ;
Perez-Gonzalez, Fernando ;
Furon, Teddy ;
Comesana, Pedro .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (04) :421-439
[10]   Security of Lattice-Based Data Hiding Against the Watermarked-Only Attack [J].
Perez-Freire, Luis ;
Perez-Gonzalez, Fernando .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (04) :593-610