Abstract
This paper puts in consideration the concepts of security and robustness in watermarking, in order to be able to establish a clear frontier between them. A new information-theoretic framework to study data-hiding and watermarking security is proposed, using the mutual information to quantify the information about the secret key that leaks from the observation of watermarked objects. This framework is applied to the analysis of a Spread-Spectrum data-hiding scheme in different scenarios. Finally, we show some interesting links between a measure proposed in previous works in the literature, which is based on Fisher Information Matrix, and our proposed measure.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Cox, I.J., Linnartz, J.P.M.G.: Some general methods for tampering with watermarks. IEEE Journal on Selected Areas in Communications 16, 587–593 (1998)
Linnartz, J.-P.M.G., van Dijk, M.: Analysis of the sensitivity attack against electronic watermarks in images. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 258–272. Springer, Heidelberg (1998)
Mitthelholzer, T.: An information-theoretic approach to steganography and watermarking. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 1–17. Springer, Heidelberg (2000)
Shannon, C.E.: Communication theory of secrecy systems. Bell system technical journal 28, 656–715 (1949)
Kalker, T.: Considerations on watermarking security. In: IEEE Int. Workshop on Multimedia Signal Processing, MMSP 2001, Cannes, France, pp. 201–206 (2001)
Barni, M., Bartolini, F., Furon, T.: A general framework for robust watermarking security. Signal Processing 83, 2069–2084 (2003)
Cayre, F., Fontaine, C., Furon, T.: Watermarking security part one: theory. In: Delp III, E.J., Wong, P.W. (eds.) Security, Steganography, and Watermarking of Multimedia Contents VII, vol. 5681, pp. 746–757. SPIE, San Jose (2005)
Furon, T., et al.: Security Analysis. European Project IST-1999-10987 CERTIMARK, Deliverable D.5.5 (2002)
Fisher, R.A.: On the mathematical foundations of theoretical statistics. Philosophical Transactions of the Royal Society 222, 309–368 (1922)
Barni, M., Bartolini, F.: Watermarking Systems Engineering. In: Signal Processing and Communications. Marcel Dekker, New York (2004)
Hernández, J.R., Pérez-González, F.: Throwing more light on image watermarks. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 191–207. Springer, Heidelberg (1998)
Kerckhoff, A.: La cryptographie militaire. Journal des sciences militaires 9, 5–38 (1883)
van Trees, H.L.: Detection, Estimation, and Modulation Theory. John Wiley and Sons, Chichester (1968)
Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley series in Telecommunications (1991)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Comesaña, P., Pérez-Freire, L., Pérez-González, F. (2005). Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds) Information Hiding. IH 2005. Lecture Notes in Computer Science, vol 3727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558859_12
Download citation
DOI: https://doi.org/10.1007/11558859_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29039-1
Online ISBN: 978-3-540-31481-3
eBook Packages: Computer ScienceComputer Science (R0)