Kerckhoffs-based embedding security classes for WOA data hiding

被引:49
作者
Cayre, Francois [1 ]
Bas, Patrick [2 ]
机构
[1] ENSIEG, F-384 St Martin Dheres, France
[2] INPG, CNRS, Gipsa Lab, F-38042 St Martin Dheres, France
关键词
security; spread-spectrum (SS) watermarking;
D O I
10.1109/TIFS.2007.916006
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It has recently been discovered that using pseudorandom sequences as carriers in spread-spectrum techniques for data-hiding is not at all a sufficient condition for ensuring data-hiding security. Using proper and realistic apriori hypothesis on the messages distribution, it is possible to accurately estimate the secret carriers by casting this estimation problem into a blind source separation problem. After reviewing relevant works on spread-spectrum security for watermarking, we further develop this topic to introduce the concept of security classes which broaden previous notions in watermarking security and fill the gap with steganography security as defined by Cachin. We define four security classes, namely, by order of creasing security: insecurity, key security, subspace security, and stegosecurity. To illustrate these views, we present two new modulations for truly secure watermarking in the watermark-only-attack (WOA) framework. The first one is called natural watermarking and can be made either stegosecure or subspace secure. The second is called circular watermarking and is key secure. We show that circular watermarking has robustness comparable to that of the insecure classical spread spectrum. We shall also propose information leakage measures to highlight the security level of our new spread-spectrum modulations.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 42 条
[31]  
MILLER ML, 2000, P IEEE INT C IMAGE P, V111, P1
[32]  
MOSKOWITZ IS, 2001, WORKSH NEW SEC PAR C
[33]  
PAPOULIS A, 2002, PROBABILITY RANDOIN
[34]  
PEREZFEIRE L, 2007, 3 WAVILA CHALLAGE
[35]  
PEREZFREIRE L, 2006, SEC STEGANOGRAPHY WA
[36]  
Sallee P, 2004, LECT NOTES COMPUT SC, V2939, P154
[37]  
SCOTT DW, 1992, MULTIVARIATE DENSIA
[38]  
Simmons G.J., 1984, Proc. CRYPTO, P51
[39]  
SOLANKI K, 2006, IEEE INT C IM PROC A
[40]  
THEARTOFCOMPUTE K, 1988, COMPUTE PROGRAMMING, V2