Share Email Print
cover

Proceedings Paper

Watermarking security part two: Practice
Author(s): Francois Cayre; Caroline Fontaine; Teddy Furon
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

This second part focuses on estimation of secret parameters of some practical watermarking techniques. The first part reveals some theoretical bounds of information leakage about secret keys from observations. However, as usual in information theory, nothing has been said about practical algorithms which pirates use in real life application. Whereas Part One deals with the necessary number of observations to disclose secret keys (see definitions of security levels), this part focuses on the complexity or the computing power of practical estimators. Again, we are inspired here by the work of Shannon as in his famous article, he has already made a clear cut between the unicity distance and the work of opponents' algorithm. Our experimental work also illustrates how Blind Source Separation (especially Independent Component Analysis) algorithms help the opponent exploiting this information leakage to disclose the secret carriers in the spread spectrum case. Simulations assess the security levels theoretically derived in Part One.

Paper Details

Date Published: 21 March 2005
PDF: 11 pages
Proc. SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, (21 March 2005); doi: 10.1117/12.586890
Show Author Affiliations
Francois Cayre, INRIA (France)
Caroline Fontaine, LIFL, CNRS, Univ. des Sciences et Technologies de Lille (France)
Teddy Furon, INRIA (France)


Published in SPIE Proceedings Vol. 5681:
Security, Steganography, and Watermarking of Multimedia Contents VII
Edward J. Delp; Ping W. Wong, Editor(s)

© SPIE. Terms of Use
Back to Top