GSM Based Security Analysis for Add-SS Watermarking

被引:0
|
作者
Zhang, Dong [1 ,2 ]
Ni, Jiangqun [1 ]
Lee, Dah-Jye [2 ]
Huang, Jiwu [1 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510275, Guangdong, Peoples R China
[2] Brigham Young Univ, Dept Elect & Comp Engn, Provo, UT 84602 USA
来源
DIGITAL WATERMARKING | 2009年 / 5450卷
关键词
SCALE MIXTURES; GAUSSIANS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Attack to security of watermarking is to estimate secret keys used in watermarking communications. The Security level of watermarking algorithms can be evaluated by Cramer-Rao Bound (CRB) for the estimation of secret keys. As a widely used method, Add-Spread-Spectrum (Add-SS) watermarking has drawn a lot of attention. Previous work on watermarking security is mainly based on the assumption that the host is Gaussian distributed and ignores the impact of the non-Gaussian characteristics of natural images. With the incorporation of Gaussian Scale Mixture (GSM) model for host signals, this paper presents a theoretical analysis on the security of the Add-SS watermarking algorithms. By giving the CRB and Modified Cramer-Rao Bound (MCRB) for the estimation of secret carriers under Known Message Attack (KMA) and Watermarked Only Attack (WOA), this paper also reveals the factors that may influence the security of Add-SS based watermarking algorithms. Results presented in this paper are very helpful for designing the new generation of secure and robust watermarking system.
引用
收藏
页码:313 / +
页数:2
相关论文
共 50 条
  • [1] Security analysis on add-SS watermarking with GSM
    School of Information Science and Technology, Sun Yat-Sen University, Guangzhou 510275, China
    不详
    Zidonghua Xuebao Acta Auto. Sin., 2009, 7 (841-850):
  • [2] ADD-based Spectral Analysis of Probing Security
    Molteni, Maria Chiara
    Zaccaria, Vittorio
    Ciriani, Valentina
    PROCEEDINGS OF THE 2022 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2022), 2022, : 987 - 992
  • [3] Security Analysis of Content-Based Watermarking Authentication Framework
    Wang, Jinwei
    Liu, Guangjie
    Lian, Shiguo
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 483 - +
  • [4] Security Analysis of Two Key based Watermarking Schemes Based on QR Decomposition
    Arasteh, Sima
    Mahdavi, Mojtaba
    Bideh, Pegah Nikbakht
    Hosseini, Samira
    Chapnevis, AmirAhmad
    26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, : 1499 - 1504
  • [5] Security analysis of an asymmetric watermarking scheme
    Wang, Xin
    Lu, Zhibo
    Peng, Silong
    2006 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-4, 2006, : 2583 - +
  • [6] ON THE SECURITY OF SINGULAR VALUE BASED WATERMARKING
    Xiong, Changzhen
    Ward, Rabab K.
    Xu, Junyi
    2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5, 2008, : 437 - 440
  • [7] Biometric Template Security based on Watermarking
    Bhatnagar, Gaurav
    Wu, Q. M. Jonathan
    Raman, Balasubramanian
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE AND EXHIBITION ON BIOMETRICS TECHNOLOGY, 2010, 2 : 227 - 235
  • [8] Intellectual Security System Design Based on GSM
    Lu, Chao
    Huang, Weihong
    ELECTRONIC INFORMATION AND ELECTRICAL ENGINEERING, 2012, 19 : 396 - 399
  • [9] Security Analysis of Radial-based 3D Watermarking Systems
    Rolland-Neviere, Xavier
    Doerr, Gwenael
    Alliez, Pierre
    2014 IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS'14), 2014, : 30 - 35
  • [10] Security analysis and improvement on a fragile image watermarking
    Sang, Jun
    Xiang, Hong
    Hu, Hai-Bo
    Fu, Li
    Cai, Bin
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2009, 31 (05): : 1204 - 1208