Skip to main content

Security Analysis of ISS Watermarking Using Natural Scene Statistics

  • Conference paper
Information Hiding (IH 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6387))

Included in the following conference series:

Abstract

Watermarking security has captured great attention from researchers in recent years. The security of watermarking is determined by the difficulty of estimating the secret key used in embedding/detecting schemes. As a widely used scheme, Improved Spread-Spectrum (ISS) watermarking performs better than Additive Spread-Spectrum (Add-SS) and is able to include Add-SS watermarking as a specialized case. Because of its popularity, the investigation on the security of ISS watermarking has been reported. Previous works on evaluating the security of ISS watermarking mainly focus on the assumption of Gaussian host and ignore the effects from the non-Gaussian characteristics of natural images. This paper analyzes the security of ISS watermarking from the viewpoint of Shannon information theory by using Gaussian Scale Mixture (GSM) model to characterize the natural scene statistics and reveals the relationship between the security and its related factors. Theoretical analysis and simulation results show that the security of ISS watermarking with the Gaussian host assumption is over-stated in previous work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Pérez-Freire, L., Comesaña, P., Trocoso-Pastoriza, J.R., Pérez-González, F.: Watermarking security: a survey. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security I. LNCS, vol. 4300, pp. 41–72. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  2. Malvar, H.S., Florencio, D.A.F.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing 51(4), 898–905 (2003)

    Article  MathSciNet  Google Scholar 

  3. Cayre, F., Fontaine, C., Furon, T.: Watermarking security: theory and practice. IEEE Transactions on Signal Processing 53(10), 3976–3987 (2005)

    Article  MathSciNet  Google Scholar 

  4. Comesaña, P., Pérez-Freire, L., Pérez-González, F.: Fundamentals of data-hiding security and their application to spread spectrum analysis. In: Zhao, W., Gong, S., Tang, X. (eds.) AMFG 2005. LNCS, vol. 3723, pp. 146–160. Springer, Heidelberg (2005)

    Google Scholar 

  5. Ni, J.Q., Zhang, R.Y., Fang, C., Huang, J.W., et al.: Watermarking security incorporating natural scene statistics. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 132–146. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. Zhang, D., Ni, J.Q., Lee, D.J.: Security analysis on Add-SS watermarking with GSM. Acta Automatica Sinica 35(7), 841–850 (2009) (in Chinese)

    Article  MathSciNet  MATH  Google Scholar 

  7. Pérez-Freire, L., Pérez-González, F.: Spread spectrum watermarking security. IEEE Transactions on Inoformation Forensics and Security 4(1), 2–24 (2009)

    Article  Google Scholar 

  8. Portilla, J., Strela, V., Wainwright, M.J., Simocelli, E.P.: Image denoising using scale mixtures of gaussians in the wavelet domain. IEEE Transactions on Image Processing 12(11), 1338–1351 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  9. Sheikh, H.R., Bovik, A.C., de Veciana, G.: An information fidelity criterion for image quality assessment using natural scene statistics. IEEE Transactions on Image Processing 14(12), 2117–2128 (2005)

    Article  Google Scholar 

  10. Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. Wiley, New York (2006)

    MATH  Google Scholar 

  11. Kerckhoffs, A.: La cruptgraphie militaire. Journal des Sciences Militaires IX, 161–191 (1883)

    Google Scholar 

  12. Zhang, X.D.: Matrix Analysis and Applications. Publishing House of Tsinghua University, Beijing (2005) (in Chinese)

    Google Scholar 

  13. Fang, K.T., Kotz, S., Ng, K.W.: Symmetric Multivariate and Related Distributions. Chapman & Hall, London (1990)

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, D., Ni, J., Zeng, Q., Lee, DJ., Huang, J. (2010). Security Analysis of ISS Watermarking Using Natural Scene Statistics. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds) Information Hiding. IH 2010. Lecture Notes in Computer Science, vol 6387. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16435-4_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16435-4_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16434-7

  • Online ISBN: 978-3-642-16435-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics