Watermarking Is Not Cryptography

  • Ingemar J. Cox
  • Gwenaël Doërr
  • Teddy Furon
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4283)

Abstract

A number of analogies to cryptographic concepts have been made about watermarking. In this paper, we argue that these analogies are misleading or incorrect, and highlight several analogies to support our argument. We believe that the fundamental role of watermarking is the reliable embedding and detection of information and should therefore be considered a form of communications. We note that the fields of communications and cryptography are quite distinct and while communications systems often combine technologies from the two fields, a layered architecture is applied that requires no knowledge of the layers above. We discuss how this layered approach can be applied to watermarking applications.

Keywords

Hash Function Multimedia Content Digital Watermark Message Authentication Code Quantization Index Modulation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Shannon, C.: A mathematical theory of communication. Bell System Technical Journal 27, 379–423, 623–656 (1948)MATHMathSciNetGoogle Scholar
  2. 2.
    Kahn, D.: Cryptology and the origins of spread spectrum. IEEE Spectrum 21, 70–80 (1984)Google Scholar
  3. 3.
    Costa, M.: Writing on dirty paper. IEEE Transactions on Information Theory 29, 439–441 (1983)MATHCrossRefGoogle Scholar
  4. 4.
    Shannon, C.: Communication theory of secrecy systems. Bell System Technical Journal 28, 656–715 (1949)MATHMathSciNetGoogle Scholar
  5. 5.
    Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires IX, 5–83 (1883)Google Scholar
  6. 6.
    Cayre, F., Fontaine, C., Furon, T.: Watermarking security: Theory and practice. IEEE Transactions on Signal Processing, Supplement on Secure Media 53, 3976–3987 (2005)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Comesaña, P., Pérez-Freire, L., Pérez-González, F.: Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 146–160. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  8. 8.
    Pérez-Freire, L., Comesaña, P., Pérez-González, F.: Information-Theoretic Analysis of Security in Side-Informed Data Hiding. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 131–145. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  9. 9.
    Pérez-Freire, L., Pérez-Gonzàlez, F., Comesaña, P.: Secret dither estimation in lattice-quantization data hiding: a set-membership approach. In: Security, Steganography, and Watermarking of Multimedia Contents VIII. Proceedings of SPIE, vol. 6072 (2006)Google Scholar
  10. 10.
    Hartung, F., Girod, B.: Fast public-key watermarking of compressed video. In: IEEE International Conference on Image Processing, vol. I, pp. 528–531 (1997)Google Scholar
  11. 11.
    Furon, T., Duhamel, P.: An asymmetric public detection watermarking technique. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 88–100. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  12. 12.
    Eggers, J., Su, J., Girod, B.: Public key watermarking by eigenvectors of linear transforms. In: Proceedings of the European Signal Processing Conference, vol. III (2000)Google Scholar
  13. 13.
    Furon, T., Duhamel, P.: An asymmetric watermarking method. IEEE Transactions on Signal Processing, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery 51, 981–995 (2003)MathSciNetGoogle Scholar
  14. 14.
    Furon, T., Venturini, I., Duhamel, P.: Unified approach of asymmetric watermarking schemes. In: Security and Watermarking of Multimedia Contents III. Proceedings of SPIE, vol. 4314, pp. 269–279 (2001)Google Scholar
  15. 15.
    Miller, M.L.: Is asymmetry watermarking necessary or sufficient? In: Proceedings of European Signal Processing Conference, vol. I, pp. 292–294 (2002)Google Scholar
  16. 16.
    Zimmermann, H.: OSI reference model - the ISO model of architecture for open systems interconnection. IEEE Transactions on Communications 28, 425–432 (1980)CrossRefGoogle Scholar
  17. 17.
    Kutter, M., Voloshynovskiy, S., Herrigel, A.: Watermark copy attack. In: Security and Watermarking of Multimedia Contents II. Proceedings of SPIE, vol. 3971, pp. 371–380 (2000)Google Scholar
  18. 18.
    Boneh, D., Shaw, J.: Collusion secure fingerprinting for digital data. IEEE Transaction on Information Theory 44, 1897–1905 (1998)MATHCrossRefMathSciNetGoogle Scholar
  19. 19.
    Trappe, W., Wu, M., Wang, Z., Liu, K.: Anti-collusion fingerprinting for multimedia. IEEE Transaction on Signal Processing, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery 51, 1069–1087 (2003)MathSciNetGoogle Scholar
  20. 20.
    Doërr, G., Dugelay, J.-L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Transactions on Signal Processing, Supplement on Secure Media 52, 2955–2964 (2004)CrossRefGoogle Scholar
  21. 21.
    Lin, E., Delp, E.: Temporal synchronization in video watermarking. IEEE Transactions on Signal Processing, Supplement on Secure Media 52, 3007–3022 (2004)CrossRefGoogle Scholar
  22. 22.
    Harmancı, Ö., Kucukgoz, M., Mıhçak, K.: Temporal synchronization of watermarked video using image hashing. In: Security, Steganography and Watermarking of Multimedia Contents VII. Proceedings of SPIE, vol. 5681, pp. 370–380 (2005)Google Scholar
  23. 23.
    Miller, M.L., Doërr, G., Cox, I.J.: Applying informed coding and informed embedding to design a robust, high capacity watermark. IEEE Transactions on Image Processing 13, 792–807 (2004)CrossRefGoogle Scholar
  24. 24.
    Abrardo, A., Barni, M., Pérez-González, F., Mosquera, C.: Trellis-Coded Rational Dither Modulation for Digital Watermarking. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 351–360. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  25. 25.
    Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceedings of the International Conference on Information Technology: Coding and Computing, pp. 178–183 (2000)Google Scholar
  26. 26.
    De Roover, C., De Vleeschouwer, C., Lefèbvre, F., Macq, B.: Robust video hashing based on radial projections of key frames. IEEE Transactions on Signal Processing, Supplement on Secure Media 53, 4020–4037 (2005)CrossRefGoogle Scholar
  27. 27.
    Kozat, S., Venkatesan, R., Mıhçak, K.: Robust perceptual image hashing via matrix invariants. In: Proceedings of the IEEE International Conference on Image Processing, vol. V, pp. 3443–3446 (2004)Google Scholar
  28. 28.
    Monga, V., Mıhçak, K.: Robust image hashing via non-negative matrix factorizations. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. II, pp. 225–228 (2006)Google Scholar
  29. 29.
    Sun, Q., Ye, S., Lin, C.-Y., Chang, S.-F.: A crypto signature scheme for image authentication over wireless channel. International Journal of Image and Graphics 5, 1–14 (2005)CrossRefGoogle Scholar
  30. 30.
    Wee, S., Apostolopoulos, J.: Secure scalable streaming enabling transcoding without decryption. In: Proceedings of the IEEE International Conference on Image Processing, vol. 1, pp. 437–440 (2001)Google Scholar
  31. 31.
    Katzenbeisser, S.: On the Integration of Watermarks and Cryptography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 50–60. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Ingemar J. Cox
    • 1
  • Gwenaël Doërr
    • 1
  • Teddy Furon
    • 2
  1. 1.University College LondonMartleshamUnited Kingdom
  2. 2.INRIA / TEMICSRennes CedexFrance

Personalised recommendations