Security Analysis of Content-Based Watermarking Authentication Framework

被引:4
|
作者
Wang, Jinwei [1 ]
Liu, Guangjie [2 ]
Lian, Shiguo [3 ]
机构
[1] CETC, Res Inst 28, Nanjing 210007, Peoples R China
[2] Univ Sci & Technol, Nanjing 210094, Peoples R China
[3] France Telecom R&D Beijing, Beijing 100080, Peoples R China
关键词
security analysis; authentication; feature watermark; watermark embedding; architecture;
D O I
10.1109/MINES.2009.181
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper analyzes the security of content-based watermarking authentication framework in the extraction of the feature watermark and the watermark embedding using information theory. Security analysis of feature watermark is composed of four parts, that is, the extracted feature is as watermark, the encrypted feature after extracted is as watermark, the encrypted feature before extracted is as watermark and the encrypted feature while extracted is as watermark. Security of watermark embedding is analyzed from two parts, that is, the watermark embedding is controlled by secret key and the watermark embedding is no secret key. Additionally, the integration security of the feature watermark and the watermark embedding is analyzed from eight aspects. Through the security analysis of these architectures, some important conclusions are proved and drawn, a the corresponding suggestions are pointed out.
引用
收藏
页码:483 / +
页数:2
相关论文
共 50 条
  • [41] GENERIC ATTACKS ON CONTENT-BASED VIDEO STREAM AUTHENTICATION
    Lo, Swee-Won
    Wei, Zhuo
    Ding, Xuhua
    Deng, Robert H.
    2014 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO WORKSHOPS (ICMEW), 2014,
  • [42] Robust text hashing for content-based document authentication
    Tan L.
    Sun X.
    Information Technology Journal, 2011, 10 (08) : 1608 - 1613
  • [43] Authentication Security of Combinatorial Watermarking for GNSS Signal Authentication
    Anderson, Jason
    Lo, Sherman
    Walter, Todd
    NAVIGATION-JOURNAL OF THE INSTITUTE OF NAVIGATION, 2024, 71 (03):
  • [44] Framework for media data and owner authentication based on cryptography, watermarking and biometric authentication
    Dittmann, J
    Steinebach, M
    Ferri, LC
    Vielhauer, C
    Steinmetz, R
    Wohlmacher, P
    MULTIMEDIA SYSTEMS AND APPLICATIONS IV, 2001, 4518 : 198 - 209
  • [45] A BSU-based sports video content analysis framework for content-based streams filtering
    Chen, JY
    Li, YH
    Lao, SY
    Wu, LD
    2003 INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND MOBILE COMPUTING, PROCEEDINGS, 2003, : 446 - 449
  • [46] Watermarking in Medical Imaging for Security and Authentication
    Rao, N. V.
    Kumari, V. Meena
    INFORMATION SECURITY JOURNAL, 2011, 20 (03): : 148 - 155
  • [47] Image content-based geometric transformation resistant watermarking approach
    Qi, XJ
    Qi, J
    2005 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS 1-5: SPEECH PROCESSING, 2005, : 829 - 832
  • [48] Image content-based watermarking resistant against geometrical distortions
    Yuan, W. G.
    Ling, H. F.
    Lu, Z. D.
    Zou, F. H.
    Yu, Y. W.
    2006 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-4, 2006, : 2632 - +
  • [49] A New Spatial Decomposition Scheme For Image Content-Based Watermarking
    Aboutammam, K.
    Tamtaoui, A.
    Aboutajdine, D.
    Kbir, M. Ait
    2009 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2009, : 539 - +
  • [50] Content-based block watermarking against cumulative and temporal attack
    Wang, J
    Liu, JCL
    2005 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), VOLS 1 AND 2, 2005, : 77 - 80