Share Email Print

Proceedings Paper

Achieving non-ambiguity of quantization-based watermarking
Author(s): Xiangui Kang; Yun Q. Shi; Jiwu Huang
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

The ambiguity attack is to derive a valid watermark from a medium to defeat the ownership claim of the real owner. Most of the research suggests that it is difficult to design a provably secure non-ambiguity watermarking without a trusted third party. Recently, Li and Chang have provided a specific blind additive spread spectrum watermarking scheme as an example that is provably non-ambiguous. However, the proposed watermarking needs the length of watermark n > 3.07 × 109 according to our analysis. In this paper, a framework for quantization based watermarking schemes and non-blind spread spectrum watermarking scheme to achieve non-ambiguity is proposed. As a result, many of the existent watermarking schemes can achieve provable non-invertibility via using this framework, and an nonambiguity ownership verification protocol without a trusted third party may be constructed. We have obtained the close form solution of false positive rate for the underlying quantization based schemes and spread spectrum watermarking schemes (both blind and non-blind). The length of key of pseudo-random sequence generator (PRSG) is extended to m = c × n, the cardinality of the valid watermark set is extended to &verline;W&verline; = 2m = 2c,n, thus leading to more security to exhaustive searching attack than the Li and Chang's scheme, which has m = &sqrt;n. In addition, the required length of watermark becomes much shorter than that required in the Li and Chang's scheme. At last, we propose a noninvertible and robust quantization-based watermarking scheme with the length of watermark being n=1024.

Paper Details

Date Published: 16 February 2006
PDF: 12 pages
Proc. SPIE 6072, Security, Steganography, and Watermarking of Multimedia Contents VIII, 60720F (16 February 2006); doi: 10.1117/12.650876
Show Author Affiliations
Xiangui Kang, Sun Yat-Sen Univ. (China)
Guangdong Province Key Lab. of Information Security (China)
New Jersey Institute of Technology (United States)
Yun Q. Shi, New Jersey Institute of Technology (United States)
Jiwu Huang, Guangdong Province Key Lab. of Information Security (China)

Published in SPIE Proceedings Vol. 6072:
Security, Steganography, and Watermarking of Multimedia Contents VIII
Edward J. Delp III; Ping Wah Wong, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?