Watermarking attack: Security of WSS techniques

10Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Most, of watermarking techniques are based on Wide Spread Spectrum (WSS). Security of such schemes is studied here in adopting a cryptanalysis point of view. The security is proportional to the difficulty the opponent has to recover the secret parameters, which are, in WSS watermarking scheme, the private carriers. Both theoretical and practical points of view are investigated when several pieces of content are watermarked with the same secret key. The opponent's difficulty is measured by the amount of data necessary to estimate accurately the private carriers, and also by the complexity of the estimation algorithms. Actually, Blind Source Separation algorithms really help the opponent exploiting the information leakage to disclose the secret carriers. The article ends with experiments comparing blind attacks to these new hacks. The main goal of the article is to warn watermarkers that embedding hidden messages with the same secret key might is a dangerous security flaws. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Cayre, F., Fontaine, C., & Furon, T. (2005). Watermarking attack: Security of WSS techniques. In Lecture Notes in Computer Science (Vol. 3304, pp. 171–183). Springer Verlag. https://doi.org/10.1007/978-3-540-31805-7_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free