[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Watermarking Is Not Cryptography

  • Conference paper
Digital Watermarking (IWDW 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4283))

Included in the following conference series:

  • 1269 Accesses

Abstract

A number of analogies to cryptographic concepts have been made about watermarking. In this paper, we argue that these analogies are misleading or incorrect, and highlight several analogies to support our argument. We believe that the fundamental role of watermarking is the reliable embedding and detection of information and should therefore be considered a form of communications. We note that the fields of communications and cryptography are quite distinct and while communications systems often combine technologies from the two fields, a layered architecture is applied that requires no knowledge of the layers above. We discuss how this layered approach can be applied to watermarking applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Shannon, C.: A mathematical theory of communication. Bell System Technical Journal 27, 379–423, 623–656 (1948)

    MATH  MathSciNet  Google Scholar 

  2. Kahn, D.: Cryptology and the origins of spread spectrum. IEEE Spectrum 21, 70–80 (1984)

    Google Scholar 

  3. Costa, M.: Writing on dirty paper. IEEE Transactions on Information Theory 29, 439–441 (1983)

    Article  MATH  Google Scholar 

  4. Shannon, C.: Communication theory of secrecy systems. Bell System Technical Journal 28, 656–715 (1949)

    MATH  MathSciNet  Google Scholar 

  5. Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires IX, 5–83 (1883)

    Google Scholar 

  6. Cayre, F., Fontaine, C., Furon, T.: Watermarking security: Theory and practice. IEEE Transactions on Signal Processing, Supplement on Secure Media 53, 3976–3987 (2005)

    Article  MathSciNet  Google Scholar 

  7. Comesaña, P., Pérez-Freire, L., Pérez-González, F.: Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 146–160. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Pérez-Freire, L., Comesaña, P., Pérez-González, F.: Information-Theoretic Analysis of Security in Side-Informed Data Hiding. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 131–145. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  9. Pérez-Freire, L., Pérez-Gonzàlez, F., Comesaña, P.: Secret dither estimation in lattice-quantization data hiding: a set-membership approach. In: Security, Steganography, and Watermarking of Multimedia Contents VIII. Proceedings of SPIE, vol. 6072 (2006)

    Google Scholar 

  10. Hartung, F., Girod, B.: Fast public-key watermarking of compressed video. In: IEEE International Conference on Image Processing, vol. I, pp. 528–531 (1997)

    Google Scholar 

  11. Furon, T., Duhamel, P.: An asymmetric public detection watermarking technique. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 88–100. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  12. Eggers, J., Su, J., Girod, B.: Public key watermarking by eigenvectors of linear transforms. In: Proceedings of the European Signal Processing Conference, vol. III (2000)

    Google Scholar 

  13. Furon, T., Duhamel, P.: An asymmetric watermarking method. IEEE Transactions on Signal Processing, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery 51, 981–995 (2003)

    MathSciNet  Google Scholar 

  14. Furon, T., Venturini, I., Duhamel, P.: Unified approach of asymmetric watermarking schemes. In: Security and Watermarking of Multimedia Contents III. Proceedings of SPIE, vol. 4314, pp. 269–279 (2001)

    Google Scholar 

  15. Miller, M.L.: Is asymmetry watermarking necessary or sufficient? In: Proceedings of European Signal Processing Conference, vol. I, pp. 292–294 (2002)

    Google Scholar 

  16. Zimmermann, H.: OSI reference model - the ISO model of architecture for open systems interconnection. IEEE Transactions on Communications 28, 425–432 (1980)

    Article  Google Scholar 

  17. Kutter, M., Voloshynovskiy, S., Herrigel, A.: Watermark copy attack. In: Security and Watermarking of Multimedia Contents II. Proceedings of SPIE, vol. 3971, pp. 371–380 (2000)

    Google Scholar 

  18. Boneh, D., Shaw, J.: Collusion secure fingerprinting for digital data. IEEE Transaction on Information Theory 44, 1897–1905 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  19. Trappe, W., Wu, M., Wang, Z., Liu, K.: Anti-collusion fingerprinting for multimedia. IEEE Transaction on Signal Processing, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery 51, 1069–1087 (2003)

    MathSciNet  Google Scholar 

  20. Doërr, G., Dugelay, J.-L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Transactions on Signal Processing, Supplement on Secure Media 52, 2955–2964 (2004)

    Article  Google Scholar 

  21. Lin, E., Delp, E.: Temporal synchronization in video watermarking. IEEE Transactions on Signal Processing, Supplement on Secure Media 52, 3007–3022 (2004)

    Article  Google Scholar 

  22. Harmancı, Ö., Kucukgoz, M., Mıhçak, K.: Temporal synchronization of watermarked video using image hashing. In: Security, Steganography and Watermarking of Multimedia Contents VII. Proceedings of SPIE, vol. 5681, pp. 370–380 (2005)

    Google Scholar 

  23. Miller, M.L., Doërr, G., Cox, I.J.: Applying informed coding and informed embedding to design a robust, high capacity watermark. IEEE Transactions on Image Processing 13, 792–807 (2004)

    Article  Google Scholar 

  24. Abrardo, A., Barni, M., Pérez-González, F., Mosquera, C.: Trellis-Coded Rational Dither Modulation for Digital Watermarking. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 351–360. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  25. Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceedings of the International Conference on Information Technology: Coding and Computing, pp. 178–183 (2000)

    Google Scholar 

  26. De Roover, C., De Vleeschouwer, C., Lefèbvre, F., Macq, B.: Robust video hashing based on radial projections of key frames. IEEE Transactions on Signal Processing, Supplement on Secure Media 53, 4020–4037 (2005)

    Article  Google Scholar 

  27. Kozat, S., Venkatesan, R., Mıhçak, K.: Robust perceptual image hashing via matrix invariants. In: Proceedings of the IEEE International Conference on Image Processing, vol. V, pp. 3443–3446 (2004)

    Google Scholar 

  28. Monga, V., Mıhçak, K.: Robust image hashing via non-negative matrix factorizations. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. II, pp. 225–228 (2006)

    Google Scholar 

  29. Sun, Q., Ye, S., Lin, C.-Y., Chang, S.-F.: A crypto signature scheme for image authentication over wireless channel. International Journal of Image and Graphics 5, 1–14 (2005)

    Article  Google Scholar 

  30. Wee, S., Apostolopoulos, J.: Secure scalable streaming enabling transcoding without decryption. In: Proceedings of the IEEE International Conference on Image Processing, vol. 1, pp. 437–440 (2001)

    Google Scholar 

  31. Katzenbeisser, S.: On the Integration of Watermarks and Cryptography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 50–60. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cox, I.J., Doërr, G., Furon, T. (2006). Watermarking Is Not Cryptography. In: Shi, Y.Q., Jeon, B. (eds) Digital Watermarking. IWDW 2006. Lecture Notes in Computer Science, vol 4283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_1

Download citation

  • DOI: https://doi.org/10.1007/11922841_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-48825-5

  • Online ISBN: 978-3-540-48827-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics