Abstract
Watermarking security has captured great attention from researchers in recent years. The security of watermarking is determined by the difficulty of estimating the secret key used in embedding/detecting schemes. As a widely used scheme, Improved Spread-Spectrum (ISS) watermarking performs better than Additive Spread-Spectrum (Add-SS) and is able to include Add-SS watermarking as a specialized case. Because of its popularity, the investigation on the security of ISS watermarking has been reported. Previous works on evaluating the security of ISS watermarking mainly focus on the assumption of Gaussian host and ignore the effects from the non-Gaussian characteristics of natural images. This paper analyzes the security of ISS watermarking from the viewpoint of Shannon information theory by using Gaussian Scale Mixture (GSM) model to characterize the natural scene statistics and reveals the relationship between the security and its related factors. Theoretical analysis and simulation results show that the security of ISS watermarking with the Gaussian host assumption is over-stated in previous work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Pérez-Freire, L., Comesaña, P., Trocoso-Pastoriza, J.R., Pérez-González, F.: Watermarking security: a survey. In: Shi, Y.Q. (ed.) Transactions on Data Hiding and Multimedia Security I. LNCS, vol. 4300, pp. 41–72. Springer, Heidelberg (2006)
Malvar, H.S., Florencio, D.A.F.: Improved spread spectrum: a new modulation technique for robust watermarking. IEEE Transactions on Signal Processing 51(4), 898–905 (2003)
Cayre, F., Fontaine, C., Furon, T.: Watermarking security: theory and practice. IEEE Transactions on Signal Processing 53(10), 3976–3987 (2005)
Comesaña, P., Pérez-Freire, L., Pérez-González, F.: Fundamentals of data-hiding security and their application to spread spectrum analysis. In: Zhao, W., Gong, S., Tang, X. (eds.) AMFG 2005. LNCS, vol. 3723, pp. 146–160. Springer, Heidelberg (2005)
Ni, J.Q., Zhang, R.Y., Fang, C., Huang, J.W., et al.: Watermarking security incorporating natural scene statistics. In: Solanki, K., Sullivan, K., Madhow, U. (eds.) IH 2008. LNCS, vol. 5284, pp. 132–146. Springer, Heidelberg (2008)
Zhang, D., Ni, J.Q., Lee, D.J.: Security analysis on Add-SS watermarking with GSM. Acta Automatica Sinica 35(7), 841–850 (2009) (in Chinese)
Pérez-Freire, L., Pérez-González, F.: Spread spectrum watermarking security. IEEE Transactions on Inoformation Forensics and Security 4(1), 2–24 (2009)
Portilla, J., Strela, V., Wainwright, M.J., Simocelli, E.P.: Image denoising using scale mixtures of gaussians in the wavelet domain. IEEE Transactions on Image Processing 12(11), 1338–1351 (2003)
Sheikh, H.R., Bovik, A.C., de Veciana, G.: An information fidelity criterion for image quality assessment using natural scene statistics. IEEE Transactions on Image Processing 14(12), 2117–2128 (2005)
Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. Wiley, New York (2006)
Kerckhoffs, A.: La cruptgraphie militaire. Journal des Sciences Militaires IX, 161–191 (1883)
Zhang, X.D.: Matrix Analysis and Applications. Publishing House of Tsinghua University, Beijing (2005) (in Chinese)
Fang, K.T., Kotz, S., Ng, K.W.: Symmetric Multivariate and Related Distributions. Chapman & Hall, London (1990)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, D., Ni, J., Zeng, Q., Lee, DJ., Huang, J. (2010). Security Analysis of ISS Watermarking Using Natural Scene Statistics. In: Böhme, R., Fong, P.W.L., Safavi-Naini, R. (eds) Information Hiding. IH 2010. Lecture Notes in Computer Science, vol 6387. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16435-4_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-16435-4_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-16434-7
Online ISBN: 978-3-642-16435-4
eBook Packages: Computer ScienceComputer Science (R0)