Skip to main content

A Computational Model for Watermark Robustness

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNSC,volume 4437)

Abstract

Multimedia security schemes often combine cryptographic schemes with information hiding techniques such as steganography or watermarking. Example applications are dispute resolving, proof of ownership, (asymmetric/anonymous) fingerprinting and zero-knowledge watermark detection. The need for formal security definitions of watermarking schemes is manifold, whereby the core need is to provide suitable abstractions to construct, analyse and prove the security of applications on top of watermarking schemes. Although there exist formal models and definitions for information-theoretic and computational security of cryptographic and steganographic schemes, they cannot simply be adapted to watermarking schemes due to the fundamental differences among these approaches. Moreover, the existing formal definitions for watermark security still suffer from conceptual deficiencies.

In this paper we make the first essential steps towards an appropriate formal definition of watermark robustness, the core security property of watermarking schemes: We point out and discuss the shortcomings of the existing proposals and present a formal framework and corresponding definitions that cover those subtle aspects not considered in the existing literature. Our definitions provide suitable abstractions that are compatible to cryptographic definitions allowing security proofs of composed schemes.

Keywords

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cachin, C.: An information-theoretic model for steganography. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 306–318. Springer, Heidelberg (1998)

    Google Scholar 

  2. Mittelholzer, T.: An information-theoretic approach to steganography and watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 1–16. Springer, Heidelberg (2000)

    Google Scholar 

  3. Hopper, N.J., Langford, J., von Ahn, L.: Provably secure steganography. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, Springer, Heidelberg (2002)

    Google Scholar 

  4. Backes, M., Cachin, C.: Public-key steganography with active attacks. Report 2003/231, Cryptology ePrint Archive (2003)

    Google Scholar 

  5. Kalker, T.: Considerations on watermark security. In: IEEE International Workshop on Multimedia Signal Processing (MMSP 2001), pp. 201–206 (2001)

    Google Scholar 

  6. Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Signal Processing, pp. 2069–2084 (2003)

    Google Scholar 

  7. Cayre, F., Fontaine, C., Furon, T.: Watermarking security, part one: theory. In: IS&T/SPIE International Symposium on Electronic Imaging 2005. In: Proceedings of the SPIE., SPIE (2005) pp.746–757. Security, Steganography, and Watermarking of Multimedia Contents VII (2005)

    Google Scholar 

  8. Comesaña, P., Pérez-Freire, L., Pérez-González, F.: An information-theoretic framework for assessing security in practical watermarking and data hiding scenarios. [21]

    Google Scholar 

  9. Comesaña, P., Pérez-Freire, L., Pérez-González, F.: Fundamentals of data-hiding security and their application to spread spectrum analysis. In: Barni, M. (ed.) IH 2005. LNCS, vol. 3727, pp. 146–160. Springer, Heidelberg (2005)

    Google Scholar 

  10. Katzenbeisser, S.: Computational security models for digital watermarks [21]

    Google Scholar 

  11. Cox, I., Miller, M.L., Bloom, J.A.: Digital Watermarking. Morgan Kaufmann Publisher, San Francisco (2002)

    Google Scholar 

  12. Tran, N.: Hiding functions and computational security of image watermarking systems. In: 15th IEEE Computer Security Foundations Workshop, pp. 295–306. IEEE Computer Society Press, Los Alamitos (2002)

    Google Scholar 

  13. Sadeghi, A.R., Steiner, M.: Assumptions related to discrete logarithms: Why subtleties make a real difference. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 243–260. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  14. Adelsbach, A., Katzenbeisser, S., Sadeghi, A.R.: On the insecurity of non-invertible watermarking schemes for dispute resolving. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 355–369. Springer, Heidelberg (2004)

    Google Scholar 

  15. Swanson, M.D., Kobayashi, M., Tewfik, A.H.: Multimedia data-embedding and watermarking technologies. In: Proceedings of the IEEE, vol. 86 (1998)

    Google Scholar 

  16. Katzenbeisser, S., Petitcolas, F.A.: Information Hiding: techniques for steganography and digital watermarking. Artech House Publishers (2000)

    Google Scholar 

  17. Hartung, F., Kutter, M.: Multimedia watermarking techniques. In: Proceedings of the IEEE, Special Issue on Identification and Protection of Multimedia Information, vol. 87, pp. 1079–1107 (1999)

    Google Scholar 

  18. Adelsbach, A., Sadeghi, A.R.: Advanced techniques for dispute resolving and authorship proofs on digital works. In: Proceedings of SPIE, Security and Watermarking of Multimedia Contents V, vol. 5020 (2003)

    Google Scholar 

  19. Boneh, D., Shaw, J.: Collusion-secure fingerprinting for digital data. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 452–465. Springer, Heidelberg (1995)

    Google Scholar 

  20. Ausiello, G., Crescenzi, P., Gambosi, G., Kann, V., Marchetti-Spaccamela, A., Protasi, M.: Complexity and Approximation. Springer-Verlag, Berlin Germany (1999)

    MATH  Google Scholar 

  21. Piva, A. (ed.): In: 6th International Workshop on Image Analysis for Multimedia Interactive Services (WIAMIS 2005), Special Session on Media Security (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jan L. Camenisch Christian S. Collberg Neil F. Johnson Phil Sallee

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Adelsbach, A., Katzenbeisser, S., Sadeghi, AR. (2007). A Computational Model for Watermark Robustness. In: Camenisch, J.L., Collberg, C.S., Johnson, N.F., Sallee, P. (eds) Information Hiding. IH 2006. Lecture Notes in Computer Science, vol 4437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74124-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74124-4_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74123-7

  • Online ISBN: 978-3-540-74124-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics