Skip to main content

Natural Watermarking: A Secure Spread Spectrum Technique for WOA

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4437)

Abstract

This paper presents a spread spectrum (SS) watermarking technique that is secure against carriers estimation in a Watermark Only Attack framework. After reviewing the sufficient conditions to design secure algorithms for watermarking and steganography, we present a setup based on Blind Source Separation (BSS) theory to assess the lack of security of classical SS techniques such as classical SS or ISS. We motivate a new SS watermarking algorithm called Natural Watermarking (NW) where the estimation of the secret carriers is impossible and which achieves perfect secrecy thanks to unchanged Gaussian distributions of the secret carriers. The theoretical evaluation of the NW security is carried out and the case of multi-bit embedding is addressed. Finally, a robust extension of NW is presented and the properties of NW and Robust-NW are both practically verified.

Keywords

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cayre, F., Fontaine, C., Furon, T.: Watermarking security part I: Theory. In: Proceedings of SPIE, Security, Steganography and Watermarking of Multimedia Contents VII, vol. 5681, San Jose, USA (2005)

    Google Scholar 

  2. Comesaña, P., Pérez-Freire, L., Pérez-González, F.: Fundamentals of data hiding security and their application to spread-spectrum analysis. In: 7th Information Hiding Workshop, IH05, Barcelona, Spain. LNCS, Springer, Heidelberg (2005)

    Google Scholar 

  3. Pérez-Freire, L., Comesaña, P., Pérez-González, F.: Information-theoretic analysis of security in side-informed data hiding. In: 7th Information Hiding Workshop, IH05, Barcelona, Spain. LNCS, Springer, Heidelberg (2005)

    Google Scholar 

  4. Bas, P., Hurri, J.: Security of dm quantization watermarking scheme: a practical study for digital images. In: International Workshop on Digital Watermarking, Sienna, Italy. LNCS, Springer Verlag, Berlin, Germany (2005)

    Google Scholar 

  5. Cayre, F., Fontaine, C., Furon, T.: Watermarking security part II: Practice. In: Proceedings of SPIE, Security, Steganography and Watermarking of Multimedia Contents VII, vol. 5681, San Jose, USA (2005)

    Google Scholar 

  6. Sallee.: Model-based steganography. In: International Workshop on Digital Watermarking (IWDW). LNCS, vol. 2, Springer, Heidelberg (2003)

    Google Scholar 

  7. HyvÄrinen, A., Karhunen, J., Oja, E.: Independent Component Analysis. John Wiley & Sons, New York (2001)

    Google Scholar 

  8. Malvar, Florencio.: Improved spread spectrum: A new modulation technique for robust watermarking. IEEE Transactions on Signal Processing 51 (2003)

    Google Scholar 

  9. Doërr, G.J., Dugelay, J.L.: Danger of low-dimensional watermarking subspaces. In: ICASSP 2004. 29th IEEE International Conference on Acoustics, Speech, and Signal Processing, pp. 17–21. Montreal, Canada (2004)

    Google Scholar 

  10. Hyvärinen, A.: Fast and robust fixed-point algorithms for independent component analysis. IEEE Transactions on Neural Networks 10(3), 626–634 (1999)

    CrossRef  Google Scholar 

  11. Kuhn, H.W.: The Hungarian method of solving the assignment problem. Naval Res. Logistics Quart. 2, 83–97 (1955)

    CrossRef  MathSciNet  Google Scholar 

  12. Eggers, J.J., Buml, R., Tzschoppe, R., Girod, B.: Scalar costa scheme for information embedding. IEEE Trans. on Signal Processing 51(4), 1003–1019 (2003)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jan L. Camenisch Christian S. Collberg Neil F. Johnson Phil Sallee

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bas, P., Cayre, F. (2007). Natural Watermarking: A Secure Spread Spectrum Technique for WOA. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds) Information Hiding. IH 2006. Lecture Notes in Computer Science, vol 4437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74124-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74124-4_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74123-7

  • Online ISBN: 978-3-540-74124-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics