Watermarking security part I: theory - Archive ouverte HAL Access content directly
Conference Papers Year : 2005

Watermarking security part I: theory

(1) , (2) , (1)
1
2

Abstract

This article proposes a theory of watermarking security based on a cryptanalysis point of view. The main idea is that information about the secret key leaks from the observations, for instance watermarked pieces of content, available to the opponent. Tools from information theory (Shannon's mutual information and Fisher's information matrix) can measure this leakage of information. The security level is then defined as the number of observations the attacker needs to successfully estimate the secret key. This theory is applied to common watermarking methods: the substitutive scheme and spread spectrum based techniques. Their security levels are calculated against three kinds of attack.
Fichier principal
Vignette du fichier
EI_2005_I.pdf (197.79 Ko) Télécharger le fichier

Dates and versions

inria-00083329 , version 1 (30-06-2006)

Identifiers

  • HAL Id : inria-00083329 , version 1

Cite

François Cayre, Caroline Fontaine, Teddy Furon. Watermarking security part I: theory. Security, Steganography, and Watermarking of Multimedia Contents VII, Jan 2005, San Jose, CA, USA, United States. pp.746--757. ⟨inria-00083329⟩
209 View
219 Download

Share

Gmail Facebook Twitter LinkedIn More