2013
DOI: 10.1109/tifs.2013.2267960
|View full text |Cite
|
Sign up to set email alerts
|

A New Measure of Watermarking Security: The Effective Key Length

Abstract: Whereas the embedding distortion, the payload and the robustness of digital watermarking schemes are well understood, the notion of security is still not completely well defined. The approach proposed in the last five years is too theoretical and solely considers the embedding process, which is half of the watermarking scheme. This paper proposes a new measure of watermarking security, called the effective key length, which captures the difficulty for the adversary to get access to the watermarking channel. Th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(13 citation statements)
references
References 24 publications
0
13
0
Order By: Relevance
“…The flowchart of embedding procedure is depicted in Fig. 3, where the feature extraction means the selection of frequency components [14], [15]. The feature extraction essentially depends on the targeted digital content.…”
Section: Host Signalmentioning
confidence: 99%
“…The flowchart of embedding procedure is depicted in Fig. 3, where the feature extraction means the selection of frequency components [14], [15]. The feature extraction essentially depends on the targeted digital content.…”
Section: Host Signalmentioning
confidence: 99%
“…In watermarking, the security against brute-force attacks depends both on the number of to-be-tested parametersε, and on the probability for the adversary to pick an equivalent parameter, which allows for a reliable decoding of a content that is watermarked with ϵ [7], [4]. In the QP framework, this probability is not easily tractable as ϵ controls multiple aspects of the watermark carrier computation.…”
Section: A Symmetric Relative Offsetmentioning
confidence: 99%
“…For instance, it is common practice to rely on a 128-bit long secret key to derive pseudo-random parameters used in the watermarking algorithm and to invoke a cryptographic argument to argue that brute-force search would be computationally prohibitive [2], [3]. However, recent works have clearly showcased that distinct keys could yield equivalent parameters that grants watermarking decoding capabilities [4]. In other words, watermarking security should not be reduced to the length of the secret key.…”
Section: Introductionmentioning
confidence: 99%
“…D ATA hiding is applied extensively to the fields of ownership protection, fingerprinting, authentication and secret communication [1], [2]. The most classical data hiding leads to permanent distortions.…”
Section: Introductionmentioning
confidence: 99%