2005
DOI: 10.1007/978-3-540-31805-7_15
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking Attack: Security of WSS Techniques

Abstract: Abstract. Most of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proportional to the difficulty the opponent has to recover the secret parameters, which are, in WSS watermarking scheme, the private carriers. Both theoretical and practical points of view are investigated when several pieces of content are watermarked with the same secret key. The opponent's difficulty is measured by the amount o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2005
2005
2009
2009

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 18 publications
0
10
0
Order By: Relevance
“…7 for CW. Since Circular Watermarking renders carrier modulation jointly circular, we obtain dependency among message modulations, thus even powerful practical BSS attacks [36] are hopeless when using CW. There are no independent directions to allow for reliable carrier estimation using ICA.…”
Section: Cw Featuresmentioning
confidence: 99%
“…7 for CW. Since Circular Watermarking renders carrier modulation jointly circular, we obtain dependency among message modulations, thus even powerful practical BSS attacks [36] are hopeless when using CW. There are no independent directions to allow for reliable carrier estimation using ICA.…”
Section: Cw Featuresmentioning
confidence: 99%
“…He has estimated the secret carriers by a WOA, with N o ∼ 1000 images such that η = 0.5 5 , and he tries to remove the hidden information for one carrier. Details of algorithm adaptations to real images may be found in [33]. by the number of observations the opponent needs in order to accurately estimate the secret key.…”
Section: E Application To a Robust Watermarking Techniquementioning
confidence: 99%
“…Also authors of [5] use the ambiguity attack to design a new zero-knowledge watermarking scheme. Recently Cayre et al [6] successfully mounted an attack on "wide spread spectrum(WSS)" based watermarking techniques, in which authors propose a key recovery attack using Blind Source Separation tools like Principal Component Analysis and Independent Component Analysis. Here, we introduce an attack which employs completely different methodology from those attacks and it is analogous to cryptographic key recovery attack.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, collusion attack may not be practical as it requires a large number of watermarked copies to be successful. Thus attacks based on single watermarked copy are gaining lot of attention [12,10,15,6]. According to [12], there are lots of redundant clips in an audio/video.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation