Watermarking security: theory and practice

Teddy Furon 1 François Cayre 1 Caroline Fontaine 2
1 TEMICS - Digital image processing, modeling and communication
IRISA - Institut de Recherche en Informatique et Systèmes Aléatoires, Inria Rennes – Bretagne Atlantique
Abstract : This article proposes a theory of watermarking security based on a cryptanalysis point of view. The main idea is that information about the secret key leaks from the observations, for instance watermarked pieces of content, available to the opponent. Tools from information theory (Shannon's mutual information and Fisher's information matrix) can measure this leakage of information. The security level is then defined as the number of observations the attacker needs to successfully estimate the secret key. This theory is applied to two common watermarking methods: the substitutive scheme and the spread spectrum based techniques. Their security levels are calculated against three kinds of attack. The experimental work illustrates how Blind Source Separation (especially Independent Component Analysis) algorithms help the opponent exploiting this information leakage to disclose the secret carriers in the spread spectrum case. Simulations assess the security levels derived in the theoretical part of the article.
Document type :
Journal articles
Complete list of metadatas

https://hal.inria.fr/inria-00088006
Contributor : Teddy Furon <>
Submitted on : Friday, July 28, 2006 - 10:34:59 AM
Last modification on : Friday, April 26, 2019 - 2:18:19 PM
Long-term archiving on : Tuesday, April 6, 2010 - 12:28:37 AM

Identifiers

  • HAL Id : inria-00088006, version 1

Citation

Teddy Furon, François Cayre, Caroline Fontaine. Watermarking security: theory and practice. IEEE Transactions on Signal Processing, Institute of Electrical and Electronics Engineers, 2005, Supplement on secure media III, 53 (10), pp.3976-3987. ⟨inria-00088006⟩

Share

Metrics

Record views

398

Files downloads

1618