GSM Based Security Analysis for Add-SS Watermarking

被引:0
|
作者
Zhang, Dong [1 ,2 ]
Ni, Jiangqun [1 ]
Lee, Dah-Jye [2 ]
Huang, Jiwu [1 ]
机构
[1] Sun Yat Sen Univ, Sch Informat Sci & Technol, Guangzhou 510275, Guangdong, Peoples R China
[2] Brigham Young Univ, Dept Elect & Comp Engn, Provo, UT 84602 USA
来源
DIGITAL WATERMARKING | 2009年 / 5450卷
关键词
SCALE MIXTURES; GAUSSIANS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Attack to security of watermarking is to estimate secret keys used in watermarking communications. The Security level of watermarking algorithms can be evaluated by Cramer-Rao Bound (CRB) for the estimation of secret keys. As a widely used method, Add-Spread-Spectrum (Add-SS) watermarking has drawn a lot of attention. Previous work on watermarking security is mainly based on the assumption that the host is Gaussian distributed and ignores the impact of the non-Gaussian characteristics of natural images. With the incorporation of Gaussian Scale Mixture (GSM) model for host signals, this paper presents a theoretical analysis on the security of the Add-SS watermarking algorithms. By giving the CRB and Modified Cramer-Rao Bound (MCRB) for the estimation of secret carriers under Known Message Attack (KMA) and Watermarked Only Attack (WOA), this paper also reveals the factors that may influence the security of Add-SS based watermarking algorithms. Results presented in this paper are very helpful for designing the new generation of secure and robust watermarking system.
引用
收藏
页码:313 / +
页数:2
相关论文
共 50 条
  • [21] Android Interface based GSM Home Security System
    Sharma, Rupam Kumar
    Mohammad, Ayub
    Kalita, Himanka
    Kalita, Dhiraj
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 196 - 201
  • [22] GSM Based Digital Door Lock Security System
    Ibrahim, Adnan
    Paravath, Afhal
    Aswin, P. K.
    Iqbal, Shijin Mohammed
    Abdulla, Shaeez Usman
    PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON POWER, INSTRUMENTATION, CONTROL AND COMPUTING (PICC), 2015,
  • [23] Vehicle monitoring based on GSM technology for safety and security
    Shahadi, H. I.
    Haider, H. T.
    Muhsen, D. H.
    2ND INTERNATIONAL CONFERENCE ON ENGINEERING SCIENCES, 2018, 433
  • [24] GSM Intelligent Home Security System Based on MCU
    Xia, Guishu
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 2443 - 2446
  • [25] Security analysis of public-key watermarking schemes
    Craver, S
    Katzenbeisser, S
    MATHEMATICS OF DATA/IMAGE CODING, COMPRESSION, AND ENCRYPTION IV, WITH APPLICATIONS, 2001, 4475 : 172 - 182
  • [26] Practical security analysis of dirty paper trellis watermarking
    Bas, Patrick
    Doerr, Gwenael
    INFORMATION HIDING, 2007, 4567 : 174 - +
  • [27] An Effective Telemedicine Security Using Wavelet Based Watermarking
    Singh, Jaskaran
    Patel, Anoop Kumar
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH, 2016, : 735 - 740
  • [28] A SECURITY TECHNIQUE BASED ON WATERMARKING AND ENCRYPTION FOR MEDICAL IMAGE
    Sarani, N.
    Amudha, K.
    2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [29] AN IRIS BASED REVERSIBLE WATERMARKING SYSTEM FOR THE SECURITY OF TELERADIOLOGY
    Balamurugan, G.
    Joseph, K. Suresh
    Arulalan, V
    2016 WORLD CONFERENCE ON FUTURISTIC TRENDS IN RESEARCH AND INNOVATION FOR SOCIAL WELFARE (STARTUP CONCLAVE), 2016,
  • [30] Impacts of Watermarking Security on Tardos-Based Fingerprinting
    Mathon, Benjamin
    Bas, Patrick
    Cayre, Francois
    Macq, Benoit
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) : 1038 - 1050