Kerckhoffs-based embedding security classes for WOA data hiding

被引:49
作者
Cayre, Francois [1 ]
Bas, Patrick [2 ]
机构
[1] ENSIEG, F-384 St Martin Dheres, France
[2] INPG, CNRS, Gipsa Lab, F-38042 St Martin Dheres, France
关键词
security; spread-spectrum (SS) watermarking;
D O I
10.1109/TIFS.2007.916006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It has recently been discovered that using pseudorandom sequences as carriers in spread-spectrum techniques for data-hiding is not at all a sufficient condition for ensuring data-hiding security. Using proper and realistic apriori hypothesis on the messages distribution, it is possible to accurately estimate the secret carriers by casting this estimation problem into a blind source separation problem. After reviewing relevant works on spread-spectrum security for watermarking, we further develop this topic to introduce the concept of security classes which broaden previous notions in watermarking security and fill the gap with steganography security as defined by Cachin. We define four security classes, namely, by order of creasing security: insecurity, key security, subspace security, and stegosecurity. To illustrate these views, we present two new modulations for truly secure watermarking in the watermark-only-attack (WOA) framework. The first one is called natural watermarking and can be made either stegosecure or subspace secure. The second is called circular watermarking and is key secure. We show that circular watermarking has robustness comparable to that of the insecure classical spread spectrum. We shall also propose information leakage measures to highlight the security level of our new spread-spectrum modulations.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 42 条
[1]   Informed watermarking by means of orthogonal and quasi-orthogonal dirty paper coding [J].
Abrardo, A ;
Barni, M .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (02) :824-833
[2]   A set theoretic framework for watermarking and its application to semifragile tamper detection [J].
Altun, Oktay ;
Sharma, Gaurav ;
Celik, Mehmet U. ;
Bocko, Mark F. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (04) :479-492
[3]  
BAS P, 2007, 9 INF HID WORKS ST M, P9
[4]  
BAS P, 2006, P I ELECT ENG T INF, V153, P127
[5]  
BLAHUT RE, 1987, PRINCIPLES PRATICE I
[6]  
Cachin C, 1998, LECT NOTES COMPUT SC, V1525, P306
[7]   Watermarking security: Theory and practice [J].
Cayre, F ;
Fontaine, C ;
Furon, T .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (10) :3976-3987
[8]  
CHANDRAMOULI R, 2003, P ACMISPRINGER MULTI, V9, P303
[9]  
Comesaña P, 2005, LECT NOTES COMPUT SC, V3727, P146
[10]  
COMESANA P, 2005, 6 INT WORKSH IM AN M