Share Email Print

Proceedings Paper

Watermarking security part one: Theory
Author(s): Francois Cayre; Caroline Fontaine; Teddy Furon
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

This article proposes a theory of watermarking security based on a cryptanalysis point of view. The main idea is that information about the secret key leaks from the observations, for instance watermarked pieces of content, available to the opponent. Tools from information theory (Shannon's mutual information and Fisher's information matrix) can measure this leakage of information. The security level is then defined as the number of observations the attacker needs to successfully estimate the secret key. This theory is applied to common watermarking methods: the substitutive scheme and spread spectrum based techniques. Their security levels are calculated against three kinds of attack.

Paper Details

Date Published: 21 March 2005
PDF: 12 pages
Proc. SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, (21 March 2005); doi: 10.1117/12.586876
Show Author Affiliations
Francois Cayre, INRIA (France)
Caroline Fontaine, LIFL, CNRS, Univ. des Sciences et Technologies de Lille (France)
Teddy Furon, INRIA (France)

Published in SPIE Proceedings Vol. 5681:
Security, Steganography, and Watermarking of Multimedia Contents VII
Edward J. Delp III; Ping W. Wong, Editor(s)

© SPIE. Terms of Use
Back to Top