Practical security analysis of dirty paper trellis watermarking

被引:0
|
作者
Bas, Patrick [1 ,2 ]
Doerr, Gwenael [3 ]
机构
[1] CIS Helsinki Univ Technol, POB 5400, FI-02015 Espoo, Finland
[2] CNRS INPG 961, Gipsa Lab, Martin Heres, F-38042 Grenoble, France
[3] UCL, London IP5 3RE, England
来源
INFORMATION HIDING | 2007年 / 4567卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper analyses the security of dirty paper trellis (DPT) watermarking schemes which use both informed coding and informed embedding. After recalling the principles of message embedding with DPT watermarking, the secret parameters of the scheme are highlighted. The security weaknesses of DPT watermarking are then presented: in the watermarked contents only attack (WOA) setup, the watermarked data-set exhibits clusters corresponding to the different patterns attached to the arcs of the trellis. The K-means clustering algorithm is used to estimate these patterns and a co-occurrence analysis is performed to retrieve the connectivity of the trellis. Experimental results demonstrate that it is possible to accurately estimate the trellis configuration, which enables to perform attacks much more efficient than simple additive white Gaussian noise (AWGN).
引用
收藏
页码:174 / +
页数:3
相关论文
共 50 条
  • [41] About the performance of practical dirty paper coding schemes in Gaussian MIMO broadcast channels
    Mohammad-Khani, G. R.
    Lasaulce, S.
    Dumont, J.
    2006 IEEE 7TH WORKSHOP ON SIGNAL PROCESSING ADVANCES IN WIRELESS COMMUNICATIONS, VOLS 1 AND 2, 2006, : 597 - 601
  • [42] Security analysis and improvement on a fragile image watermarking
    Sang, Jun
    Xiang, Hong
    Hu, Hai-Bo
    Fu, Li
    Cai, Bin
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2009, 31 (05): : 1204 - 1208
  • [43] Security Theory and Attack Analysis for Text Watermarking
    Zhou, Xinmin
    Zhao, Weidong
    Wang, Zhicheng
    Pan, Li
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 264 - 269
  • [44] SECURITY - DIRTY WORD
    BARLOW, G
    JOURNAL OF ADOLESCENCE, 1978, 1 (04) : 345 - 351
  • [45] A trellis-enhanced secure spread spectrum watermarking scheme and its performance analysis
    Cheng, MC
    Lay, KT
    Sun, CC
    PROCEEDINGS OF THE 2004 IEEE ASIA-PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, VOL 1 AND 2: SOC DESIGN FOR UBIQUITOUS INFORMATION TECHNOLOGY, 2004, : 593 - 596
  • [46] Writing on dirty paper with feedback
    Liu, Jialing
    Elia, Nicola
    PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, 2006, : 468 - 473
  • [47] On robust dirty paper coding
    Khina, Anatoly
    Erez, Uri
    2008 IEEE INFORMATION THEORY WORKSHOP, 2008, : 204 - 208
  • [48] On "Dirty-Paper coding"
    Peel, CB
    IEEE SIGNAL PROCESSING MAGAZINE, 2003, 20 (03) : 112 - 113
  • [49] On The Dispersion of Dirty Paper Coding
    Scarlett, Jonathan
    2014 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2014, : 2282 - 2286
  • [50] Generalized writing on dirty paper
    Cohen, AS
    Lapidoth, A
    ISIT: 2002 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2002, : 227 - 227