Abstract
A number of analogies to cryptographic concepts have been made about watermarking. In this paper, we argue that these analogies are misleading or incorrect, and highlight several analogies to support our argument. We believe that the fundamental role of watermarking is the reliable embedding and detection of information and should therefore be considered a form of communications. We note that the fields of communications and cryptography are quite distinct and while communications systems often combine technologies from the two fields, a layered architecture is applied that requires no knowledge of the layers above. We discuss how this layered approach can be applied to watermarking applications.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Shannon, C.: A mathematical theory of communication. Bell System Technical Journal 27, 379–423, 623–656 (1948)
Kahn, D.: Cryptology and the origins of spread spectrum. IEEE Spectrum 21, 70–80 (1984)
Costa, M.: Writing on dirty paper. IEEE Transactions on Information Theory 29, 439–441 (1983)
Shannon, C.: Communication theory of secrecy systems. Bell System Technical Journal 28, 656–715 (1949)
Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires IX, 5–83 (1883)
Cayre, F., Fontaine, C., Furon, T.: Watermarking security: Theory and practice. IEEE Transactions on Signal Processing, Supplement on Secure Media 53, 3976–3987 (2005)
Comesaña, P., Pérez-Freire, L., Pérez-González, F.: Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 146–160. Springer, Heidelberg (2005)
Pérez-Freire, L., Comesaña, P., Pérez-González, F.: Information-Theoretic Analysis of Security in Side-Informed Data Hiding. In: Barni, M., Herrera-Joancomartí, J., Katzenbeisser, S., Pérez-González, F. (eds.) IH 2005. LNCS, vol. 3727, pp. 131–145. Springer, Heidelberg (2005)
Pérez-Freire, L., Pérez-Gonzàlez, F., Comesaña, P.: Secret dither estimation in lattice-quantization data hiding: a set-membership approach. In: Security, Steganography, and Watermarking of Multimedia Contents VIII. Proceedings of SPIE, vol. 6072 (2006)
Hartung, F., Girod, B.: Fast public-key watermarking of compressed video. In: IEEE International Conference on Image Processing, vol. I, pp. 528–531 (1997)
Furon, T., Duhamel, P.: An asymmetric public detection watermarking technique. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 88–100. Springer, Heidelberg (2000)
Eggers, J., Su, J., Girod, B.: Public key watermarking by eigenvectors of linear transforms. In: Proceedings of the European Signal Processing Conference, vol. III (2000)
Furon, T., Duhamel, P.: An asymmetric watermarking method. IEEE Transactions on Signal Processing, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery 51, 981–995 (2003)
Furon, T., Venturini, I., Duhamel, P.: Unified approach of asymmetric watermarking schemes. In: Security and Watermarking of Multimedia Contents III. Proceedings of SPIE, vol. 4314, pp. 269–279 (2001)
Miller, M.L.: Is asymmetry watermarking necessary or sufficient? In: Proceedings of European Signal Processing Conference, vol. I, pp. 292–294 (2002)
Zimmermann, H.: OSI reference model - the ISO model of architecture for open systems interconnection. IEEE Transactions on Communications 28, 425–432 (1980)
Kutter, M., Voloshynovskiy, S., Herrigel, A.: Watermark copy attack. In: Security and Watermarking of Multimedia Contents II. Proceedings of SPIE, vol. 3971, pp. 371–380 (2000)
Boneh, D., Shaw, J.: Collusion secure fingerprinting for digital data. IEEE Transaction on Information Theory 44, 1897–1905 (1998)
Trappe, W., Wu, M., Wang, Z., Liu, K.: Anti-collusion fingerprinting for multimedia. IEEE Transaction on Signal Processing, Special Issue on Signal Processing for Data Hiding in Digital Media and Secure Content Delivery 51, 1069–1087 (2003)
Doërr, G., Dugelay, J.-L.: Security pitfalls of frame-by-frame approaches to video watermarking. IEEE Transactions on Signal Processing, Supplement on Secure Media 52, 2955–2964 (2004)
Lin, E., Delp, E.: Temporal synchronization in video watermarking. IEEE Transactions on Signal Processing, Supplement on Secure Media 52, 3007–3022 (2004)
Harmancı, Ö., Kucukgoz, M., Mıhçak, K.: Temporal synchronization of watermarked video using image hashing. In: Security, Steganography and Watermarking of Multimedia Contents VII. Proceedings of SPIE, vol. 5681, pp. 370–380 (2005)
Miller, M.L., Doërr, G., Cox, I.J.: Applying informed coding and informed embedding to design a robust, high capacity watermark. IEEE Transactions on Image Processing 13, 792–807 (2004)
Abrardo, A., Barni, M., Pérez-González, F., Mosquera, C.: Trellis-Coded Rational Dither Modulation for Digital Watermarking. In: Barni, M., Cox, I., Kalker, T., Kim, H.-J. (eds.) IWDW 2005. LNCS, vol. 3710, pp. 351–360. Springer, Heidelberg (2005)
Fridrich, J., Goljan, M.: Robust hash functions for digital watermarking. In: Proceedings of the International Conference on Information Technology: Coding and Computing, pp. 178–183 (2000)
De Roover, C., De Vleeschouwer, C., Lefèbvre, F., Macq, B.: Robust video hashing based on radial projections of key frames. IEEE Transactions on Signal Processing, Supplement on Secure Media 53, 4020–4037 (2005)
Kozat, S., Venkatesan, R., Mıhçak, K.: Robust perceptual image hashing via matrix invariants. In: Proceedings of the IEEE International Conference on Image Processing, vol. V, pp. 3443–3446 (2004)
Monga, V., Mıhçak, K.: Robust image hashing via non-negative matrix factorizations. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, vol. II, pp. 225–228 (2006)
Sun, Q., Ye, S., Lin, C.-Y., Chang, S.-F.: A crypto signature scheme for image authentication over wireless channel. International Journal of Image and Graphics 5, 1–14 (2005)
Wee, S., Apostolopoulos, J.: Secure scalable streaming enabling transcoding without decryption. In: Proceedings of the IEEE International Conference on Image Processing, vol. 1, pp. 437–440 (2001)
Katzenbeisser, S.: On the Integration of Watermarks and Cryptography. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 50–60. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cox, I.J., Doërr, G., Furon, T. (2006). Watermarking Is Not Cryptography. In: Shi, Y.Q., Jeon, B. (eds) Digital Watermarking. IWDW 2006. Lecture Notes in Computer Science, vol 4283. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11922841_1
Download citation
DOI: https://doi.org/10.1007/11922841_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-48825-5
Online ISBN: 978-3-540-48827-9
eBook Packages: Computer ScienceComputer Science (R0)